mirror of
https://github.com/resf/distro-tools.git
synced 2024-11-24 14:11:26 +00:00
111 lines
8.1 KiB
XML
111 lines
8.1 KiB
XML
<updates>
|
|
<update from="releng@rockylinux.org" status="final" type="security" version="2">
|
|
<id>RLSA-2022:1821</id>
|
|
<title>Moderate: python27:2.7 security update</title>
|
|
<description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
|
|
|
|
Security Fix(es):
|
|
|
|
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
|
|
|
|
* python: ftplib should not use the host from the PASV response (CVE-2021-4189)
|
|
|
|
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
|
|
|
|
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
|
|
|
|
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
|
|
|
|
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
|
|
|
|
Additional Changes:
|
|
|
|
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.</description>
|
|
<issued>2022-05-10 08:02:50</issued>
|
|
<updated>2023-02-02 13:41:28</updated>
|
|
<rights>Copyright 2023 Rocky Enterprise Software Foundation</rights>
|
|
<release>Rocky Linux 8</release>
|
|
<pushcount>1</pushcount>
|
|
<severity>Moderate</severity>
|
|
<summary>An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
|
|
This update affects Rocky Linux 8.
|
|
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list</summary>
|
|
<description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL.
|
|
|
|
Security Fix(es):
|
|
|
|
* python: urllib: Regular expression DoS in AbstractBasicAuthHandler (CVE-2021-3733)
|
|
|
|
* python: ftplib should not use the host from the PASV response (CVE-2021-4189)
|
|
|
|
* python-lxml: HTML Cleaner allows crafted and SVG embedded scripts to pass through (CVE-2021-43818)
|
|
|
|
* python: urllib.parse does not sanitize URLs containing ASCII newline and tabs (CVE-2022-0391)
|
|
|
|
* python: urllib: HTTP client possible infinite loop on a 100 Continue response (CVE-2021-3737)
|
|
|
|
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
|
|
|
|
Additional Changes:
|
|
|
|
For detailed information on changes in this release, see the Rocky Linux 8.6 Release Notes linked from the References section.</description>
|
|
<solution />
|
|
<references>
|
|
<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3733" id="CVE-2021-3733" type="cve" title="CVE-2021-3733" />
|
|
<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3737" id="CVE-2021-3737" type="cve" title="CVE-2021-3737" />
|
|
<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4189" id="CVE-2021-4189" type="cve" title="CVE-2021-4189" />
|
|
<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43818" id="CVE-2021-43818" type="cve" title="CVE-2021-43818" />
|
|
<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0391" id="CVE-2022-0391" type="cve" title="CVE-2022-0391" />
|
|
<reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1995162" id="1995162" type="bugzilla" title="" />
|
|
<reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1995234" id="1995234" type="bugzilla" title="" />
|
|
<reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2006792" id="2006792" type="bugzilla" title="" />
|
|
<reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2032569" id="2032569" type="bugzilla" title="" />
|
|
<reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2036020" id="2036020" type="bugzilla" title="" />
|
|
<reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2047376" id="2047376" type="bugzilla" title="" />
|
|
<reference href="https://errata.rockylinux.org/RLSA-2022:1821" id="RLSA-2022:1821" type="self" title="RLSA-2022:1821" />
|
|
</references>
|
|
<pkglist />
|
|
</update>
|
|
<update from="releng@rockylinux.org" status="final" type="security" version="2">
|
|
<id>RLSA-2022:7593</id>
|
|
<title>Moderate: python27:2.7 security update</title>
|
|
<description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
|
|
|
|
Security Fix(es):
|
|
|
|
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107).
|
|
|
|
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
|
|
|
|
Additional Changes:
|
|
|
|
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.</description>
|
|
<issued>2022-11-08 06:23:47</issued>
|
|
<updated>2023-02-02 13:52:34</updated>
|
|
<rights>Copyright 2023 Rocky Enterprise Software Foundation</rights>
|
|
<release>Rocky Linux 8</release>
|
|
<pushcount>1</pushcount>
|
|
<severity>Moderate</severity>
|
|
<summary>An update is available for python-pymongo, python2-rpm-macros, python-sqlalchemy, python-backports, python-docutils, pytest, python-psycopg2, python-lxml, python-PyMySQL, python-urllib3, PyYAML, python-pytest-mock, python-attrs, python-jinja2, python-docs, python-requests, python-mock, python-ipaddress, python-funcsigs, python2-six, python-py, python2, python2-pip, python-chardet, python-markupsafe, python-pluggy, python-pygments, python2-setuptools, Cython, python-virtualenv, babel, python-dns, python-wheel, python-pysocks, python-backports-ssl_match_hostname, python-coverage, python-setuptools_scm, pytz, python-nose, scipy, python-idna, numpy.
|
|
This update affects Rocky Linux 8.
|
|
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list</summary>
|
|
<description>Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing.
|
|
|
|
Security Fix(es):
|
|
|
|
* python: mailcap: findmatch() function does not sanitize the second argument (CVE-2015-20107).
|
|
|
|
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
|
|
|
|
Additional Changes:
|
|
|
|
For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.</description>
|
|
<solution />
|
|
<references>
|
|
<reference href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-20107" id="CVE-2015-20107" type="cve" title="CVE-2015-20107" />
|
|
<reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075390" id="2075390" type="bugzilla" title="" />
|
|
<reference href="https://errata.rockylinux.org/RLSA-2022:7593" id="RLSA-2022:7593" type="self" title="RLSA-2022:7593" />
|
|
</references>
|
|
<pkglist />
|
|
</update>
|
|
</updates> |