EulerOS Virtualization 2.10.1 : python3 (EulerOS-SA-2026-1141)

medium Nessus Plugin ID 297362

Synopsis

The remote EulerOS Virtualization host is missing multiple security updates.

Description

According to the versions of the python3 packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :

There is a defect in the CPython 'tarfile' module affecting the 'TarFile' extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. This vulnerability can be mitigated by including the following patch after importing the 'tarfile' module:
https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1(CVE-2025-8194)

During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.(CVE-2025-1795)

The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.(CVE-2025-6069)

There is an issue in CPython when using `bytes.decode('unicode_escape', error='ignore|replace')`. If you are not using the 'unicode_escape' encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.(CVE-2025-4516)

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.(CVE-2024-11168)

Tenable has extracted the preceding description block directly from the EulerOS Virtualization python3 security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected python3 packages.

See Also

http://www.nessus.org/u?a3de047a

Plugin Details

Severity: Medium

ID: 297362

File Name: EulerOS_SA-2026-1141.nasl

Version: 1.1

Type: local

Published: 1/31/2026

Updated: 1/31/2026

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C

CVSS Score Source: CVE-2025-8194

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: Medium

Base Score: 6.3

Threat Score: 1.7

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N

CVSS Score Source: CVE-2024-11168

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:python3-fgo, cpe:/o:huawei:euleros:uvp:2.10.1, p-cpe:/a:huawei:euleros:python3-unversioned-command, p-cpe:/a:huawei:euleros:python3

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/uvp_version

Exploit Ease: No known exploits are available

Patch Publication Date: 1/30/2026

Vulnerability Publication Date: 11/12/2024

Reference Information

CVE: CVE-2024-11168, CVE-2025-1795, CVE-2025-4516, CVE-2025-6069, CVE-2025-8194

IAVA: 2024-A-0748-S, 2025-A-0444