@@ -114,4 +114,69 @@ If you want to keep using public PyPI and fetch only specific patched packages f
114114
115115 </CodeWithCopy >
116116
117-
117+ ## Resolved CVEs
118+
119+ Fixes for the following vulnerabilities are available in ELS for Python Libraries from TuxCare versions:
120+
121+ <details >
122+ <summary >Click to expand resolved CVEs in ELS for Python Libraries</summary >
123+
124+ | CVE ID | Severity | Library | Vulnerable Version | Safe Version |
125+ | :-----------------: | :------: | :----------: | :----------------: | :----------: |
126+ | GHSA-56pw -mpj4-fxww | High | pillow | 9.4.0 | 9.4.0.post2+tuxcare |
127+ | GHSA-h4gh -qq45-vh27 | Medium | cryptography | 42.0.8 | 42.0.8.post1+tuxcare |
128+ | CVE-2019 -6446 | Critical | numpy | 1.16.0 | 1.16.0.post1+tuxcare |
129+ | CVE-2020 -7694 | Low | uvicorn | 0.11.6 | 0.11.6.post1+tuxcare |
130+ | CVE-2020 -7695 | High | uvicorn | 0.11.6 | 0.11.6.post1+tuxcare |
131+ | CVE-2021 -41945 | N/A | httpx | 0.22.0 | 0.22.0.post1+tuxcare |
132+ | CVE-2022 -23491 | High | certifi | 2021.10.8 | 2021.10.08.post2+tuxcare |
133+ | CVE-2023 -4863 | High | pillow | 9.4.0 | 9.4.0.post2+tuxcare |
134+ | CVE-2023 -4863 | High | pillow | 9.5.0 | 9.5.0.post1+tuxcare |
135+ | CVE-2023 -23934 | Low | werkzeug | 1.0.1 | 1.0.1.post3+tuxcare |
136+ | CVE-2023 -23969 | High | django | 4.0 | 4.0.post1+tuxcare |
137+ | CVE-2023 -24580 | High | django | 4.0 | 4.0.post1+tuxcare |
138+ | CVE-2023 -25577 | High | werkzeug | 1.0.1 | 1.0.1.post1+tuxcare<br >1.0.1.post2+tuxcare<br >1.0.1.post3+tuxcare |
139+ | CVE-2023 -30861 | High | flask | 1.1.2 | 1.1.2.post1+tuxcare |
140+ | CVE-2023 -30861 | High | flask | 1.1.2 | 2.2.1.post1+tuxcare |
141+ | CVE-2023 -32681 | Medium | requests | 2.25.1 | 2.25.1.post1+tuxcare |
142+ | CVE-2023 -32681 | Medium | requests | 2.30.0 | 2.30.0.post1+tuxcare |
143+ | CVE-2023 -37276 | High | aiohttp | 3.8.4 | 3.8.4.post1+tuxcare |
144+ | CVE-2023 -37920 | Critical | certifi | 2021.10.8 | 2021.10.08.post1+tuxcare<br >2021.10.08.post2+tuxcare |
145+ | CVE-2023 -37920 | Critical | certifi | 2022.12.7 | 2022.12.07.post1+tuxcare<br >2022.12.07.post2+tuxcare |
146+ | CVE-2023 -44271 | High | pillow | 9.4.0 | 9.4.0.post1+tuxcare |
147+ | CVE-2023 -47627 | High | aiohttp | 3.8.5 | 3.8.5.post1+tuxcare |
148+ | CVE-2023 -50447 | High | pillow | 9.4.0 | 9.4.0.post2+tuxcare |
149+ | CVE-2023 -50447 | High | pillow | 9.5.0 | 9.5.0.post1+tuxcare |
150+ | CVE-2024 -3651 | High | idna | 2.1 | 2.1.post1+tuxcare |
151+ | CVE-2024 -5629 | N/A | pymongo | 3.13.0 | 3.13.0.post1+tuxcare |
152+ | CVE-2024 -6345 | High | setuptools | 65.5.1 | 65.5.1.post1+tuxcare |
153+ | CVE-2024 -6827 | High | gunicorn | 22.0.0 | 22.0.0.post1+tuxcare |
154+ | CVE-2024 -7923 | Critical | gunicorn | 20.1.0 | 20.1.0.post2+tuxcare |
155+ | CVE-2024 -12797 | High | cryptography | 42.0.8 | 42.0.8.post1+tuxcare |
156+ | CVE-2024 -12797 | N/A | cryptography | 43.0.1 | 43.0.1.post1+tuxcare |
157+ | CVE-2024 -12797 | N/A | cryptography | 43.0.3 | 43.0.3.post1+tuxcare |
158+ | CVE-2024 -22195 | Medium | jinja2 | 2.11.3 | 2.11.3.post1+tuxcare<br >2.11.3.post2+tuxcare |
159+ | CVE-2024 -24680 | High | django | 5.0.1 | 5.0.1.post1+tuxcare |
160+ | CVE-2024 -24762 | High | fastapi | 0.104.1 | 0.104.1.post1+tuxcare |
161+ | CVE-2024 -27351 | Medium | django | 5.0.2 | 5.0.2.post1+tuxcare |
162+ | CVE-2024 -28219 | Medium | pillow | 9.4.0 | 9.4.0.post3+tuxcare |
163+ | CVE-2024 -34064 | Medium | jinja2 | 2.11.3 | 2.11.3.post1+tuxcare<br >2.11.3.post2+tuxcare |
164+ | CVE-2024 -39689 | High | certifi | 2022.12.7 | 2022.12.07.post2+tuxcare |
165+ | CVE-2024 -39689 | High | certifi | 2023.7.22 | 2023.07.22.post1+tuxcare |
166+ | CVE-2024 -47081 | Medium | requests | 2.32.3 | 2.32.3.post1+tuxcare |
167+ | CVE-2024 -49766 | Medium | werkzeug | 1.0.1 | 1.0.1.post1+tuxcare<br >1.0.1.post2+tuxcare<br >1.0.1.post3+tuxcare |
168+ | CVE-2024 -49767 | High | werkzeug | 1.0.1 | 1.0.1.post1+tuxcare<br >1.0.1.post3+tuxcare |
169+ | CVE-2024 -49768 | Medium | waitress | 2.1.2 | 2.1.2.post1+tuxcare<br >2.1.2.post2+tuxcare |
170+ | CVE-2024 -49769 | High | waitress | 2.1.2 | 2.1.2.post2+tuxcare |
171+ | CVE-2024 -52304 | High | aiohttp | 3.8.5 | 3.8.5.post2+tuxcare |
172+ | CVE-2024 -56326 | Medium | jinja2 | 2.11.3 | 2.11.3.post2+tuxcare |
173+ | CVE-2024 -56374 | Medium | django | 5.1.4 | 5.1.4.post1+tuxcare |
174+ | CVE-2025 -27516 | Medium | jinja2 | 2.11.3 | 2.11.3.post2+tuxcare |
175+ | CVE-2025 -47273 | High | setuptools | 75.8.0 | 75.8.0.post1+tuxcare |
176+ | CVE-2025 -50817 | N/A | future | 1.0.0 | 1.0.0.post1+tuxcare |
177+
178+ ** N/A (Not Available)** mean that the National Vulnerability Database (NVD) has registered this CVE, but an official CVSS severity score has not yet been assigned.
179+
180+ </details >
181+
182+ If you are interested in the TuxCare Endless Lifecycle Support, contact
[ [email protected] ] ( mailto:[email protected] ) .
0 commit comments