CVE-2024-8088

Infinite loop when iterating over zip archive entry names from zipfile.Path

Description

There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFile" class is unaffected. When iterating over names of entries in a zip archive (for example, methods of "zipfile.Path" like "namelist()", "iterdir()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.

Category

8.7
CVSS
Severity: High
CVSS 4.0 •
EPSS 0.07%
Vendor Advisory python.org
Affected: Python Software Foundation CPython
Published at:
Updated at:

References

Link Tags
https://mail.python.org/archives/list/security-announce@python.org/thread/GNFCKVI4TCATKQLALJ5SN4L4CSPSMILU/ vendor advisory
https://github.com/python/cpython/pull/122906 patch
https://github.com/python/cpython/issues/122905 issue tracking
https://github.com/python/cpython/commit/795f2597a4be988e2bb19b69ff9958e981cb894e patch
https://github.com/python/cpython/commit/8c7348939d8a3ecd79d630075f6be1b0c5b41f64 patch
https://github.com/python/cpython/commit/dcc5182f27c1500006a1ef78e10613bb45788dea patch
https://github.com/python/cpython/commit/e0264a61119d551658d9445af38323ba94fc16db patch
https://github.com/python/cpython/issues/123270 issue tracking
https://github.com/python/cpython/commit/2231286d78d328c2f575e0b05b16fe447d1656d6 patch
https://github.com/python/cpython/commit/7e8883a3f04d308302361aeffc73e0e9837f19d4 patch
https://github.com/python/cpython/commit/95b073bddefa6243effa08e131e297c0383e7f6a patch
https://github.com/python/cpython/commit/7bc367e464ce50b956dd232c1dfa1cad4e7fb814 patch
https://github.com/python/cpython/commit/962055268ed4f2ca1d717bfc8b6385de50a23ab7 patch
https://github.com/python/cpython/commit/fc0b8259e693caa8400fa8b6ac1e494e47ea7798 patch
https://github.com/python/cpython/commit/0aa1ee22ab6e204e9d3d0e9dd63ea648ed691ef1 patch
http://www.openwall.com/lists/oss-security/2024/08/22/1
http://www.openwall.com/lists/oss-security/2024/08/22/4
http://www.openwall.com/lists/oss-security/2024/08/23/1
http://www.openwall.com/lists/oss-security/2024/08/23/2
https://security.netapp.com/advisory/ntap-20241011-0010/

Frequently Asked Questions

What is the severity of CVE-2024-8088?
CVE-2024-8088 has been scored as a high severity vulnerability.
How to fix CVE-2024-8088?
To fix CVE-2024-8088, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-8088 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-8088 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-8088?
CVE-2024-8088 affects Python Software Foundation CPython.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.