WID-SEC-W-2026-0824

Vulnerability from csaf_certbund - Published: 2026-03-22 23:00 - Updated: 2026-03-26 23:00
Summary
Python: Schwachstelle ermöglicht Codeausführung
Severity
Mittel
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: Python ist eine universelle, üblicherweise interpretierte, höhere Programmiersprache.
Angriff: Ein Angreifer kann eine Schwachstelle in Python ausnutzen, um beliebigen Programmcode auszuführen.
Betroffene Betriebssysteme: - Linux - Sonstiges - UNIX - Windows

{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Python ist eine universelle, \u00fcblicherweise interpretierte, h\u00f6here Programmiersprache.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein Angreifer kann eine Schwachstelle in Python ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2026-0824 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0824.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2026-0824 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0824"
      },
      {
        "category": "external",
        "summary": "CVE Record vom 2026-03-20",
        "url": "https://www.cve.org/CVERecord?id=CVE-2026-4519"
      },
      {
        "category": "external",
        "summary": "Python Mailing List vom 2026-03-20",
        "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/AY5NDSS433JK56Q7Q5IS7B37QFZVVOUS/"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-15F71C015C vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-15f71c015c"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-3D7EA476E1 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-3d7ea476e1"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-013FB3D1BC vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-013fb3d1bc"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-3B4578D2F4 vom 2026-03-27",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-3b4578d2f4"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-304F76C660 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-304f76c660"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-9C8D7E5C9A vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-9c8d7e5c9a"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-838BF0F5D5 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-838bf0f5d5"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-919A30C67B vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-919a30c67b"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-BA6745D242 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-ba6745d242"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-E2F42121F3 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-e2f42121f3"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-E8C06584A9 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-e8c06584a9"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-1FB0E26534 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-1fb0e26534"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-F7B3EBE324 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-f7b3ebe324"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-1E87D53608 vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-1e87d53608"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2026-0FF49872AE vom 2026-03-26",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2026-0ff49872ae"
      }
    ],
    "source_lang": "en-US",
    "title": "Python: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
    "tracking": {
      "current_release_date": "2026-03-26T23:00:00.000+00:00",
      "generator": {
        "date": "2026-03-27T09:01:33.429+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.5.0"
        }
      },
      "id": "WID-SEC-W-2026-0824",
      "initial_release_date": "2026-03-22T23:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2026-03-22T23:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2026-03-25T23:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2026-03-26T23:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates von Fedora aufgenommen"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c3.15.0",
                "product": {
                  "name": "Open Source Python \u003c3.15.0",
                  "product_id": "T051762"
                }
              },
              {
                "category": "product_version",
                "name": "3.15.0",
                "product": {
                  "name": "Open Source Python 3.15.0",
                  "product_id": "T051762-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:python:python:3.15.0"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Python"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-4519",
      "product_status": {
        "known_affected": [
          "T051762",
          "74185"
        ]
      },
      "release_date": "2026-03-22T23:00:00.000+00:00",
      "title": "CVE-2026-4519"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…