Skip to content

Commit ee0a443

Browse files
authored
Merge pull request #337 from sboldyreva/python
Update Python Libraries
2 parents ef7061b + 2880b34 commit ee0a443

File tree

9 files changed

+518
-169
lines changed

9 files changed

+518
-169
lines changed

docs/.vuepress/components/ELSTechnology.vue

Lines changed: 37 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -608,7 +608,7 @@ const techData = [
608608
},
609609
{
610610
name: "Django",
611-
versions: "3.2.25 | 4.0 | 5.0 | 5.0.1 | 5.0.2 | 5.1 | 5.1.4 | 5.1.9",
611+
versions: "3.2.25 | 4.0 | 4.2 | 5.0 | 5.0.1 | 5.0.2 | 5.1 | 5.1.4 | 5.1.9",
612612
link: "./django/",
613613
},
614614
{
@@ -623,7 +623,7 @@ const techData = [
623623
},
624624
{
625625
name: "Flask",
626-
versions: "1.1.2 | 2.2.1",
626+
versions: "0.12.5 | 1.1.2 | 1.1.4 | 2.2.1",
627627
link: "./flask/",
628628
},
629629
{
@@ -653,7 +653,7 @@ const techData = [
653653
},
654654
{
655655
name: "idna",
656-
versions: "2.1 | 2.8 | 3.6",
656+
versions: "2.1 | 2.8 | 2.10 | 3.6",
657657
link: "./python-libraries/",
658658
},
659659
{
@@ -693,7 +693,12 @@ const techData = [
693693
},
694694
{
695695
name: "Pillow",
696-
versions: "9.4.0 | 9.5.0 | 11.2.1",
696+
versions: "8.4.0 | 9.4.0 | 9.5.0 | 11.2.1",
697+
link: "./python-libraries/",
698+
},
699+
{
700+
name: "protobuf",
701+
versions: "4.24.3",
697702
link: "./python-libraries/",
698703
},
699704
{
@@ -711,6 +716,11 @@ const techData = [
711716
versions: "3.13.0",
712717
link: "./python-libraries/",
713718
},
719+
{
720+
name: "pypdf",
721+
versions: "5.9.0",
722+
link: "./python-libraries/",
723+
},
714724
{
715725
name: "python-jose",
716726
versions: "3.3.0",
@@ -721,6 +731,11 @@ const techData = [
721731
versions: "0.0.6",
722732
link: "./python-libraries/",
723733
},
734+
{
735+
name: "PyYAML",
736+
versions: "5.3.1",
737+
link: "./python-libraries/",
738+
},
724739
{
725740
name: "redis-py",
726741
versions: "4.5.1",
@@ -733,7 +748,7 @@ const techData = [
733748
},
734749
{
735750
name: "setuptools",
736-
versions: "65.5.1 | 68.0.0 | 75.8.0",
751+
versions: "65.5.1 | 68.0.0 | 70.3.0 | 75.0.0 | 75.8.0",
737752
link: "./python-libraries/",
738753
},
739754
{
@@ -743,17 +758,27 @@ const techData = [
743758
},
744759
{
745760
name: "statsmodels",
746-
versions: "0.14.4",
761+
versions: "0.14.4 | 0.14.5",
762+
link: "./python-libraries/",
763+
},
764+
{
765+
name: "torch",
766+
versions: "1.13.1",
747767
link: "./python-libraries/",
748768
},
749769
{
750770
name: "tqdm",
751771
versions: "4.66.1",
752772
link: "./python-libraries/",
753773
},
774+
{
775+
name: "twisted",
776+
versions: "20.3.0",
777+
link: "./python-libraries/",
778+
},
754779
{
755780
name: "urllib3",
756-
versions: "1.26.20",
781+
versions: "1.25.11 | 1.26.4 | 1.26.20",
757782
link: "./python-libraries/",
758783
},
759784
{
@@ -766,6 +791,11 @@ const techData = [
766791
versions: "2.1.2",
767792
link: "./python-libraries/",
768793
},
794+
{
795+
name: "websockets",
796+
versions: "8.1",
797+
link: "./python-libraries/",
798+
},
769799
{
770800
name: "Werkzeug",
771801
versions: "1.0.1 | 2.2.3",

docs/els-for-libraries/celery/README.md

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,7 @@ Endless Lifecycle Support (ELS) for Libraries from TuxCare provides security fix
66

77
* **Celery** 5.1.2
88

9-
**Supported architecture:** x86_64.
10-
11-
Other versions and architectures upon request.
9+
Other versions upon request.
1210

1311
## Connection to ELS for Celery Repository
1412

@@ -98,12 +96,16 @@ If you want to keep using public PyPI and fetch only specific patched packages f
9896

9997
</CodeWithCopy>
10098

99+
## Upgrading to a Newer TuxCare Version
100+
101+
To upgrade to a newer TuxCare release (e.g., from `version.post1+tuxcare` to `version.post2+tuxcare`) use the same installation method you used above and specify the newer package version.
102+
101103
## Resolved CVEs
102104

103105
Fixes for the following vulnerabilities are available in ELS for Celery from TuxCare versions:
104106

105-
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
106-
| :-----------------: | :------: | :----: | :----------------: | :----------: |
107-
| CVE-2021-23727 | High | celery | 5.1.2 | 5.1.2.post1+tuxcare |
107+
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
108+
| :------------: | :------: | :-----: | :-----------------: | :-----------------: |
109+
| CVE-2021-23727 | High | celery | 5.1.2 | 5.1.2.post1+tuxcare |
108110

109111
If you are interested in the TuxCare Endless Lifecycle Support, contact [[email protected]](mailto:[email protected]).

docs/els-for-libraries/django/README.md

Lines changed: 43 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,9 @@ Endless Lifecycle Support (ELS) for Libraries from TuxCare provides security fix
44

55
## Supported Django Versions
66

7-
* **Django** 3.2.25, 4.0, 5.0, 5.0.1, 5.0.2, 5.1, 5.1.4, 5.1.9
7+
* **Django** 3.2.25, 4.0, 4.2, 5.0, 5.0.1, 5.0.2, 5.1, 5.1.4, 5.1.9
88

9-
**Supported architecture:** x86_64.
10-
11-
Other versions and architectures upon request.
9+
Other versions upon request.
1210

1311
## Connection to ELS for Django Repository
1412

@@ -98,34 +96,50 @@ If you want to keep using public PyPI and fetch only specific patched packages f
9896

9997
</CodeWithCopy>
10098

99+
## Upgrading to a Newer TuxCare Version
100+
101+
To upgrade to a newer TuxCare release (e.g., from `version.post1+tuxcare` to `version.post2+tuxcare`) use the same installation method you used above and specify the newer package version.
102+
101103
## Resolved CVEs
102104

103105
Fixes for the following vulnerabilities are available in ELS for Django from TuxCare versions:
104106

105-
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
106-
| :-----------------: | :------: | :----: | :----------------: | :----------: |
107-
| CVE-2025-57833 | High | django | 3.2.25 | 3.2.25.post1+tuxcare |
108-
| CVE-2024-56374 | Medium | django | 5.1.4 | 5.1.4.post1+tuxcare |
109-
| CVE-2024-42005 | High | django | 5.0 | 5.0.post5+tuxcare |
110-
| CVE-2024-41990 | High | django | 5.0 | 5.0.post5+tuxcare |
111-
| CVE-2024-41989 | High | django | 5.0.1 | 5.0.1.post3+tuxcare |
112-
| CVE-2024-39614 | N/A | django | 5.0 | 5.0.post2+tuxcare |
113-
| CVE-2024-39330 | N/A | django | 5.0 | 5.0.post4+tuxcare |
114-
| CVE-2024-39329 | N/A | django | 5.0.1 | 5.0.1.post2+tuxcare |
115-
| CVE-2024-27351 | Medium | django | 5.0.2 | 5.0.2.post1+tuxcare |
116-
| CVE-2024-24680 | High | django | 5.0.1 | 5.0.1.post1+tuxcare |
117-
| CVE-2023-24580 | High | django | 4.0 | 4.0.post1+tuxcare |
118-
| CVE-2023-23969 | High | django | 4.0 | 4.0.post1+tuxcare |
119-
| CVE-2022-41323 | High | django | 5.1 | 5.1.post1+tuxcare |
120-
| CVE-2022-41323 | High | django | 4.0 | 4.0.post2+tuxcare |
121-
| CVE-2022-36359 | High | django | 4.0 | 4.0.post3+tuxcare |
122-
| CVE-2022-34265 | Critical | django | 4.0 | 4.0.post3+tuxcare |
123-
| CVE-2022-28347 | Critical | django | 4.0 | 4.0.post3+tuxcare |
124-
| CVE-2022-28346 | Critical | django | 4.0 | 4.0.post4+tuxcare |
125-
| CVE-2021-45452 | Medium | django | 4.0 | 4.0.post4+tuxcare |
126-
| CVE-2021-45116 | High | django | 4.0 | 4.0.post2+tuxcare |
127-
| CVE-2021-45115 | High | django | 4.0 | 4.0.post4+tuxcare |
128-
129-
**N/A (Not Available)** mean that the National Vulnerability Database (NVD) has registered this CVE, but an official CVSS severity score has not yet been assigned.
107+
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
108+
| :------------: | :------: | :-----: | :-----------------: | :------------------: |
109+
| CVE-2025-57833 | High | django | 3.2.25 | 3.2.25.post1+tuxcare |
110+
| CVE-2025-48432 | N/A | django | 4.2 | 4.2.post1+tuxcare |
111+
| CVE-2025-48432 | N/A | django | 5.1.9 | 5.1.9.post1+tuxcare |
112+
| CVE-2025-27556 | N/A | django | 5.1 | 5.1.post2+tuxcare |
113+
| CVE-2024-56374 | Medium | django | 5.1.4 | 5.1.4.post1+tuxcare |
114+
| CVE-2024-53908 | N/A | django | 5.1 | 5.1.post3+tuxcare |
115+
| CVE-2024-53907 | N/A | django | 5.1 | 5.1.post3+tuxcare |
116+
| CVE-2024-45231 | N/A | django | 5.1 | 5.1.post2+tuxcare |
117+
| CVE-2024-45230 | N/A | django | 5.1 | 5.1.post3+tuxcare |
118+
| CVE-2024-42005 | High | django | 5.0 | 5.0.post5+tuxcare |
119+
| CVE-2024-41991 | N/A | django | 5.0.1 | 5.0.1.post2+tuxcare |
120+
| CVE-2024-41990 | High | django | 5.0 | 5.0.post5+tuxcare |
121+
| CVE-2024-41989 | High | django | 5.0.1 | 5.0.1.post3+tuxcare |
122+
| CVE-2024-39614 | N/A | django | 5.0 | 5.0.post2+tuxcare |
123+
| CVE-2024-39330 | N/A | django | 5.0 | 5.0.post4+tuxcare |
124+
| CVE-2024-39329 | N/A | django | 5.0.1 | 5.0.1.post2+tuxcare |
125+
| CVE-2024-38875 | N/A | django | 5.0 | 5.0.post3+tuxcare |
126+
| CVE-2024-27351 | Medium | django | 5.0.2 | 5.0.2.post1+tuxcare |
127+
| CVE-2024-24680 | High | django | 5.0 | 5.0.post1+tuxcare |
128+
| CVE-2024-24680 | High | django | 5.0.1 | 5.0.1.post1+tuxcare |
129+
| CVE-2023-24580 | High | django | 4.0 | 4.0.post1+tuxcare |
130+
| CVE-2023-23969 | High | django | 4.0 | 4.0.post1+tuxcare |
131+
| CVE-2022-41323 | High | django | 4.0 | 4.0.post2+tuxcare |
132+
| CVE-2022-41323 | High | django | 5.1 | 5.1.post1+tuxcare |
133+
| CVE-2022-36359 | High | django | 4.0 | 4.0.post3+tuxcare |
134+
| CVE-2022-34265 | Critical | django | 4.0 | 4.0.post3+tuxcare |
135+
| CVE-2022-28347 | Critical | django | 4.0 | 4.0.post3+tuxcare |
136+
| CVE-2022-28346 | Critical | django | 4.0 | 4.0.post4+tuxcare |
137+
| CVE-2022-23833 | N/A | django | 4.0 | 4.0.post6+tuxcare |
138+
| CVE-2022-22818 | N/A | django | 4.0 | 4.0.post5+tuxcare |
139+
| CVE-2021-45452 | Medium | django | 4.0 | 4.0.post4+tuxcare |
140+
| CVE-2021-45116 | High | django | 4.0 | 4.0.post2+tuxcare |
141+
| CVE-2021-45115 | High | django | 4.0 | 4.0.post4+tuxcare |
142+
143+
**N/A (Not Available)** means that the National Vulnerability Database (NVD) has registered this CVE, but an official CVSS severity score has not yet been assigned.
130144

131145
If you are interested in the TuxCare Endless Lifecycle Support, contact [[email protected]](mailto:[email protected]).

docs/els-for-libraries/fastapi/README.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,7 @@ Endless Lifecycle Support (ELS) for Libraries from TuxCare provides security fix
66

77
* **FastAPI** 0.63.0, 0.104.1
88

9-
**Supported architecture:** x86_64.
10-
11-
Other versions and architectures upon request.
9+
Other versions upon request.
1210

1311
## Connection to ELS for FastAPI Repository
1412

@@ -98,13 +96,18 @@ If you want to keep using public PyPI and fetch only specific patched packages f
9896

9997
</CodeWithCopy>
10098

99+
## Upgrading to a Newer TuxCare Version
100+
101+
To upgrade to a newer TuxCare release (e.g., from `version.post1+tuxcare` to `version.post2+tuxcare`) use the same installation method you used above and specify the newer package version.
102+
101103
## Resolved CVEs
102104

103105
Fixes for the following vulnerabilities are available in ELS for FastAPI from TuxCare versions:
104106

105-
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
106-
| :-----------------: | :------: | :----: | :----------------: | :----------: |
107-
| CVE-2024-24762 | High | fastapi | 0.104.1 | 0.104.1.post1+tuxcare |
108-
| CVE-2021-32677 | High | fastapi | 0.63.0 | 0.63.0.post1+tuxcare |
107+
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
108+
| :------------: | :------: | :-----: | :-----------------: | :-------------------: |
109+
| CVE-2024-24762 | High | fastapi | 0.63.0 | 0.63.0.post2+tuxcare |
110+
| CVE-2024-24762 | High | fastapi | 0.104.1 | 0.104.1.post1+tuxcare |
111+
| CVE-2021-32677 | High | fastapi | 0.63.0 | 0.63.0.post1+tuxcare |
109112

110113
If you are interested in the TuxCare Endless Lifecycle Support, contact [[email protected]](mailto:[email protected]).

docs/els-for-libraries/flask/README.md

Lines changed: 12 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,9 @@ Endless Lifecycle Support (ELS) for Libraries from TuxCare provides security fix
44

55
## Supported Flask Versions
66

7-
* **Flask** 1.1.2, 2.2.1
7+
* **Flask** 0.12.5, 1.1.2, 1.1.4, 2.2.1
88

9-
**Supported architecture:** x86_64.
10-
11-
Other versions and architectures upon request.
9+
Other versions upon request.
1210

1311
## Connection to ELS for Flask Repository
1412

@@ -98,13 +96,19 @@ If you want to keep using public PyPI and fetch only specific patched packages f
9896

9997
</CodeWithCopy>
10098

99+
## Upgrading to a Newer TuxCare Version
100+
101+
To upgrade to a newer TuxCare release (e.g., from `version.post1+tuxcare` to `version.post2+tuxcare`) use the same installation method you used above and specify the newer package version.
102+
101103
## Resolved CVEs
102104

103105
Fixes for the following vulnerabilities are available in ELS for Flask from TuxCare versions:
104106

105-
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
106-
| :-----------------: | :------: | :----: | :----------------: | :----------: |
107-
| CVE-2023-30861 | High | flask | 2.2.1 | 2.2.1.post1+tuxcare |
108-
| CVE-2023-30861 | High | flask | 1.1.2 | 1.1.2.post1+tuxcare |
107+
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
108+
| :--------------: | :------: | :-----: | :-----------------: | :------------------: |
109+
| CVE-2023-30861 | High | flask | 1.1.2 | 1.1.2.post1+tuxcare |
110+
| CVE-2023-30861 | High | flask | 1.1.4 | 1.1.4.post1+tuxcare |
111+
| CVE-2023-30861 | High | flask | 2.2.1 | 2.2.1.post1+tuxcare |
112+
| CVE-2019-1010083 | High | flask | 0.12.5 | 0.12.5.post1+tuxcare |
109113

110114
If you are interested in the TuxCare Endless Lifecycle Support, contact [[email protected]](mailto:[email protected]).

docs/els-for-libraries/numpy/README.md

Lines changed: 8 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,7 @@ Endless Lifecycle Support (ELS) for Libraries from TuxCare provides security fix
66

77
* **NumPy** 1.15.4, 1.16.0
88

9-
**Supported architecture:** x86_64.
10-
11-
Other versions and architectures upon request.
9+
Other versions upon request.
1210

1311
## Connection to ELS for NumPy Repository
1412

@@ -98,13 +96,18 @@ If you want to keep using public PyPI and fetch only specific patched packages f
9896

9997
</CodeWithCopy>
10098

99+
## Upgrading to a Newer TuxCare Version
100+
101+
To upgrade to a newer TuxCare release (e.g., from `version.post1+tuxcare` to `version.post2+tuxcare`) use the same installation method you used above and specify the newer package version.
102+
101103
## Resolved CVEs
102104

103105
Fixes for the following vulnerabilities are available in ELS for NumPy from TuxCare versions:
104106

105107
| CVE ID | Severity | Library | Vulnerable Versions | Safe Version |
106108
| :------------: | :------: | :-----: | :-----------------: | :------------------: |
107-
| CVE-2021-34141 | Medium | numpy | < 1.22.0 | 1.15.4.post2+tuxcare |
108-
| CVE-2019-6446 | Critical | numpy | <= 1.16.0 | 1.16.0.post1+tuxcare<br>1.15.4.post1+tuxcare |
109+
| CVE-2021-34141 | Medium | numpy | 1.15.4 | 1.15.4.post2+tuxcare |
110+
| CVE-2019-6446 | Critical | numpy | 1.15.4 | 1.15.4.post1+tuxcare |
111+
| CVE-2019-6446 | Critical | numpy | 1.16.0 | 1.16.0.post1+tuxcare |
109112

110113
If you are interested in the TuxCare Endless Lifecycle Support, contact [[email protected]](mailto:[email protected]).

0 commit comments

Comments
 (0)