← Volver a CVEs
CVE-2026-3479
N/ADescripcion
DISPUTED: The project has clarified that the documentation was incorrect, and that pkgutil.get_data() has the same security model as open(). The documentation has been updated to clarify this point. There is no vulnerability in the function if following the intended security model. pkgutil.get_data() did not validate the resource argument as documented, allowing path traversals.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado3/18/2026
Ultima modificacion4/7/2026
Fuentenvd
Avistamientos honeypot0
Debilidades (CWE)
CWE-22
Referencias
https://github.com/python/cpython/issues/146121(cna@python.org)
https://github.com/python/cpython/pull/146122(cna@python.org)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.