Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in python-kombu
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in python-kombu
ID: FEDORA-2022-1dae017601
Distribution: Fedora
Plattformen: Fedora 35
Datum: So, 16. Januar 2022, 10:07
Referenzen: https://bugzilla.redhat.com/show_bug.cgi?id=2035982
https://bugzilla.redhat.com/show_bug.cgi?id=2035660
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23727
Applikationen: python-kombu

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2022-1dae017601
2022-01-16 01:17:23.607899
-------------------------------------------------------------------------------
-

Name : python-kombu
Product : Fedora 35
Version : 5.2.3
Release : 1.fc35
URL : http://kombu.readthedocs.org/
Summary : An AMQP Messaging Framework for Python
Description :
AMQP is the Advanced Message Queuing Protocol, an open standard protocol
for message orientation, queuing, routing, reliability and security.

One of the most popular implementations of AMQP is RabbitMQ.

The aim of Kombu is to make messaging in Python as easy as possible by
providing an idiomatic high-level interface for the AMQP protocol, and
also provide proven and tested solutions to common messaging problems.

-------------------------------------------------------------------------------
-
Update Information:

- kombu 5.2.3: https://github.com/celery/kombu/blob/master/Changelog.rst#523 -
celery 5.2.3: https://github.com/celery/celery/blob/master/Changelog.rst#523
-------------------------------------------------------------------------------
-
ChangeLog:

* Thu Jan 6 2022 Frantisek Zatloukal <fzatlouk@redhat.com> - 1:5.2.3-1
- kombu 5.2.3
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #2035660 - python-celery-5.2.3 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2035660
[ 2 ] Bug #2035982 - python-kombu-5.2.3 is available
https://bugzilla.redhat.com/show_bug.cgi?id=2035982
[ 3 ] Bug #2037532 - CVE-2021-23727 python-celery: celery: stored command
injection vulnerability may allow privileges escalation [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2037532
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-1dae017601' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung