Debian dla-4354 : pypy3 - security update

medium Nessus Plugin ID 272097

Synopsis

The remote Debian host is missing one or more security-related updates.

Description

The remote Debian 11 host has packages installed that are affected by multiple vulnerabilities as referenced in the dla-4354 advisory.

- ------------------------------------------------------------------------- Debian LTS Advisory DLA-4354-1 [email protected] https://www.debian.org/lts/security/ Andrej Shadura October 31, 2025 https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : pypy3 Version : 7.3.5+dfsg-2+deb11u5 CVE ID : CVE-2024-6232 CVE-2024-6923 CVE-2024-7592 CVE-2024-11168 CVE-2025-0938 CVE-2025-1795 CVE-2025-6069 CVE-2025-8291

This upload fixes a few of security issues in the Python standard library included with PyPy, an alternative implementation of the Python 3 language.

CVE-2024-6232

The tarfile module used to parse tar parsed header values with regular expressions that allowed for backtracking, which could be used to cause denial of service via specifically-crafted tar archives (ReDoS). Since tar headers have a well-known format that doesn't require backtracking to parse reliably, the new method of parsing only requires a single pass over a byte stream.

CVE-2024-6923

The email module didnt properly quote newlines when serialising email messages, which could be used to inject newlines that would affect the interpretation of the email headers. An attacker could cause some email headers to be completely skipped or potentially hide malicious headers within other headers.

CVE-2024-7592

The http.cookies, when parsing cookies that contained backslashes for quoted characters in the cookie value, would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value. E.g. parsing a 20000+ byte cookie would take about a second (ReDoS).

CVE-2024-11168 and CVE-2025-0938

The urllib.parse.urlsplit and urlparse functions improperly validated domain names that included square brackets allowing hosts that weren't IPv6 or IPvFuture.

CVE-2025-1795

In the email module, during an address list folding, when a separating comma ended up on a folded line and that line is to be Unicode-encoded, then the separator itself was also Unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This could result in the address header being misinterpreted by some mail servers.

CVE-2025-6069

The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.

CVE-2025-8291

The zipfile module would not check the validity of the ZIP64 End of Central Directory (EOCD).
Locator record offset value would not be used to locate the ZIP64 EOCD record, but instead the ZIP64 EOCD record would be assumed to be the previous record in the ZIP archive. This could be abused to create ZIP archives that are handled differently by the zipfile module compared to other ZIP implementations. Remediation maintains this behavior, but checks that the offset specified in the ZIP64 EOCD Locator record matches the expected value.

For Debian 11 bullseye, these problems have been fixed in version 7.3.5+dfsg-2+deb11u5.

We recommend that you upgrade your pypy3 packages.

For the detailed security status of pypy3 please refer to its security tracker page at:
https://security-tracker.debian.org/tracker/pypy3

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

Tenable has extracted the preceding description block directly from the Debian security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade the pypy3 packages.

See Also

https://security-tracker.debian.org/tracker/source-package/pypy3

https://security-tracker.debian.org/tracker/CVE-2024-11168

https://security-tracker.debian.org/tracker/CVE-2024-6232

https://security-tracker.debian.org/tracker/CVE-2024-6923

https://security-tracker.debian.org/tracker/CVE-2024-7592

https://security-tracker.debian.org/tracker/CVE-2025-0938

https://security-tracker.debian.org/tracker/CVE-2025-1795

https://security-tracker.debian.org/tracker/CVE-2025-6069

https://security-tracker.debian.org/tracker/CVE-2025-8291

https://packages.debian.org/source/bullseye/pypy3

Plugin Details

Severity: Medium

ID: 272097

File Name: debian_DLA-4354.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/31/2025

Updated: 10/31/2025

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2024-7592

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 6.3

Threat Score: 2.9

Threat Vector: CVSS:4.0/E:P

Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N

CVSS Score Source: CVE-2025-0938

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:pypy3-tk, p-cpe:/a:debian:debian_linux:pypy3-dev, cpe:/o:debian:debian_linux:11.0, p-cpe:/a:debian:debian_linux:pypy3-lib, p-cpe:/a:debian:debian_linux:pypy3-doc, p-cpe:/a:debian:debian_linux:pypy3, p-cpe:/a:debian:debian_linux:pypy3-lib-testsuite

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/31/2025

Vulnerability Publication Date: 8/1/2024

Reference Information

CVE: CVE-2024-11168, CVE-2024-6232, CVE-2024-6923, CVE-2024-7592, CVE-2025-0938, CVE-2025-1795, CVE-2025-6069, CVE-2025-8291