Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:4791

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Moderate

Описание

Moderate: python39:3.9 security update

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

  • mod_wsgi: Trusted Proxy Headers Removing Bypass (CVE-2022-2255)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
python39x86_641.module+el8.10.0+1876+829fd4e0python39-3.9.20-1.module+el8.10.0+1876+829fd4e0.x86_64.rpm
python39-cffix86_642.module+el8.10.0+1582+bc278001python39-cffi-1.14.3-2.module+el8.10.0+1582+bc278001.x86_64.rpm
python39-cffix86_642.module+el8.10.0+1860+afcc1c71python39-cffi-1.14.3-2.module+el8.10.0+1860+afcc1c71.x86_64.rpm
python39-chardetnoarch19.module+el8.10.0+1860+afcc1c71python39-chardet-3.0.4-19.module+el8.10.0+1860+afcc1c71.noarch.rpm
python39-chardetnoarch19.module+el8.10.0+1582+bc278001python39-chardet-3.0.4-19.module+el8.10.0+1582+bc278001.noarch.rpm
python39-chardetnoarch19.module+el8.10.0+1582+bc278001python39-chardet-3.0.4-19.module+el8.10.0+1582+bc278001.noarch.rpm
python39-chardetnoarch19.module+el8.10.0+1860+afcc1c71python39-chardet-3.0.4-19.module+el8.10.0+1860+afcc1c71.noarch.rpm
python39-cryptographyx86_643.module+el8.10.0+1697+7e517775python39-cryptography-3.3.1-3.module+el8.10.0+1697+7e517775.x86_64.rpm
python39-cryptographyx86_643.module+el8.10.0+1860+afcc1c71python39-cryptography-3.3.1-3.module+el8.10.0+1860+afcc1c71.x86_64.rpm
python39-develx86_641.module+el8.10.0+1876+829fd4e0python39-devel-3.9.20-1.module+el8.10.0+1876+829fd4e0.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.3
redhat
больше 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
nvd
больше 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
msrc
больше 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.

CVSS3: 7.5
debian
больше 3 лет назад

A vulnerability was found in mod_wsgi. The X-Client-IP header is not r ...