DEBIAN-CVE-2025-22153

Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2025-22153
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2025-22153.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2025-22153
Upstream
Published
2025-01-23T18:15:33Z
Modified
2025-09-18T05:18:12Z
Summary
[none]
Details

RestrictedPython is a tool that helps to define a subset of the Python language which allows to provide a program input into a trusted environment. Via a type confusion bug in versions of the CPython interpreter starting in 3.11 and prior to 3.13.2 when using try/except*, RestrictedPython starting in version 6.0 and prior to version 8.0 could be bypassed. The issue is patched in version 8.0 of RestrictedPython by removing support for try/except* clauses. No known workarounds are available.

References

Affected packages

Debian:13 / restrictedpython

Package

Name
restrictedpython
Purl
pkg:deb/debian/restrictedpython?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / restrictedpython

Package

Name
restrictedpython
Purl
pkg:deb/debian/restrictedpython?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.0-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}