Описание
ELSA-2025-14750: fence-agents security update (MODERATE)
[4.2.1-129.14]
- fence_aws: add skip_os_shutdown parameter Resolves: RHEL-109814
[4.2.1-129.13]
- bundled requests: fix CVE-2024-47081 Resolves: RHEL-104741
[4.2.1-129.12]
- fence_ibm_vpc: add apikey file support Resolves: RHEL-107506
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
fence-agents-all
4.2.1-129.el8_10.14
fence-agents-amt-ws
4.2.1-129.el8_10.14
fence-agents-apc
4.2.1-129.el8_10.14
fence-agents-apc-snmp
4.2.1-129.el8_10.14
fence-agents-bladecenter
4.2.1-129.el8_10.14
fence-agents-brocade
4.2.1-129.el8_10.14
fence-agents-cisco-mds
4.2.1-129.el8_10.14
fence-agents-cisco-ucs
4.2.1-129.el8_10.14
fence-agents-common
4.2.1-129.el8_10.14
fence-agents-compute
4.2.1-129.el8_10.14
fence-agents-drac5
4.2.1-129.el8_10.14
fence-agents-eaton-snmp
4.2.1-129.el8_10.14
fence-agents-emerson
4.2.1-129.el8_10.14
fence-agents-eps
4.2.1-129.el8_10.14
fence-agents-heuristics-ping
4.2.1-129.el8_10.14
fence-agents-hpblade
4.2.1-129.el8_10.14
fence-agents-ibm-powervs
4.2.1-129.el8_10.14
fence-agents-ibm-vpc
4.2.1-129.el8_10.14
fence-agents-ibmblade
4.2.1-129.el8_10.14
fence-agents-ifmib
4.2.1-129.el8_10.14
fence-agents-ilo-moonshot
4.2.1-129.el8_10.14
fence-agents-ilo-mp
4.2.1-129.el8_10.14
fence-agents-ilo-ssh
4.2.1-129.el8_10.14
fence-agents-ilo2
4.2.1-129.el8_10.14
fence-agents-intelmodular
4.2.1-129.el8_10.14
fence-agents-ipdu
4.2.1-129.el8_10.14
fence-agents-ipmilan
4.2.1-129.el8_10.14
fence-agents-kdump
4.2.1-129.el8_10.14
fence-agents-kubevirt
4.2.1-129.el8_10.14
fence-agents-mpath
4.2.1-129.el8_10.14
fence-agents-redfish
4.2.1-129.el8_10.14
fence-agents-rhevm
4.2.1-129.el8_10.14
fence-agents-rsa
4.2.1-129.el8_10.14
fence-agents-rsb
4.2.1-129.el8_10.14
fence-agents-sbd
4.2.1-129.el8_10.14
fence-agents-scsi
4.2.1-129.el8_10.14
fence-agents-virsh
4.2.1-129.el8_10.14
fence-agents-vmware-rest
4.2.1-129.el8_10.14
fence-agents-vmware-soap
4.2.1-129.el8_10.14
fence-agents-wti
4.2.1-129.el8_10.14
Oracle Linux x86_64
fence-agents-all
4.2.1-129.el8_10.14
fence-agents-amt-ws
4.2.1-129.el8_10.14
fence-agents-apc
4.2.1-129.el8_10.14
fence-agents-apc-snmp
4.2.1-129.el8_10.14
fence-agents-bladecenter
4.2.1-129.el8_10.14
fence-agents-brocade
4.2.1-129.el8_10.14
fence-agents-cisco-mds
4.2.1-129.el8_10.14
fence-agents-cisco-ucs
4.2.1-129.el8_10.14
fence-agents-common
4.2.1-129.el8_10.14
fence-agents-compute
4.2.1-129.el8_10.14
fence-agents-drac5
4.2.1-129.el8_10.14
fence-agents-eaton-snmp
4.2.1-129.el8_10.14
fence-agents-emerson
4.2.1-129.el8_10.14
fence-agents-eps
4.2.1-129.el8_10.14
fence-agents-heuristics-ping
4.2.1-129.el8_10.14
fence-agents-hpblade
4.2.1-129.el8_10.14
fence-agents-ibm-powervs
4.2.1-129.el8_10.14
fence-agents-ibm-vpc
4.2.1-129.el8_10.14
fence-agents-ibmblade
4.2.1-129.el8_10.14
fence-agents-ifmib
4.2.1-129.el8_10.14
fence-agents-ilo-moonshot
4.2.1-129.el8_10.14
fence-agents-ilo-mp
4.2.1-129.el8_10.14
fence-agents-ilo-ssh
4.2.1-129.el8_10.14
fence-agents-ilo2
4.2.1-129.el8_10.14
fence-agents-intelmodular
4.2.1-129.el8_10.14
fence-agents-ipdu
4.2.1-129.el8_10.14
fence-agents-ipmilan
4.2.1-129.el8_10.14
fence-agents-kdump
4.2.1-129.el8_10.14
fence-agents-kubevirt
4.2.1-129.el8_10.14
fence-agents-lpar
4.2.1-129.el8_10.14
fence-agents-mpath
4.2.1-129.el8_10.14
fence-agents-redfish
4.2.1-129.el8_10.14
fence-agents-rhevm
4.2.1-129.el8_10.14
fence-agents-rsa
4.2.1-129.el8_10.14
fence-agents-rsb
4.2.1-129.el8_10.14
fence-agents-sbd
4.2.1-129.el8_10.14
fence-agents-scsi
4.2.1-129.el8_10.14
fence-agents-virsh
4.2.1-129.el8_10.14
fence-agents-vmware-rest
4.2.1-129.el8_10.14
fence-agents-vmware-soap
4.2.1-129.el8_10.14
fence-agents-wti
4.2.1-129.el8_10.14
Связанные CVE
Связанные уязвимости
Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session.
Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session.
Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session.
Requests vulnerable to .netrc credentials leak via malicious URLs
Requests is a HTTP library. Due to a URL parsing issue, Requests relea ...