You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, @kvalakuzhyzp , @RCourt , I'd like to report a vulnerability issue in zelos_0.2.0.
Issue Description
zelos_0.2.0 directly or transitively depends on 111 C libraries (.so). However, I noticed that some C libraries are vulnerable, containing the following CVEs: ld-linux-armhf.so.3libc.so.6ld-linux-x86-64.so.2ld-2.27.sold-linux.so.2libanl-2.27.solibanl.so.1libBrokenLocale-2.27.solibBrokenLocale.so.1libc-2.27.solibcidn-2.27.solibcidn.so.1libcrypt-2.27.solibcrypt.so.1libdl-2.27.solibdl.so.2libm-2.27.solibm.so.6libmemusage.solibnsl-2.27.solibnsl.so.1libnss_compat-2.27.solibnss_compat.so.2libnss_dns-2.27.solibnss_dns.so.2libnss_files-2.27.solibnss_files.so.2libnss_hesiod-2.27.solibnss_hesiod.so.2libnss_nis-2.27.solibnss_nis.so.2libnss_nisplus-2.27.solibnss_nisplus.so.2libpcprofile.solibpthread-2.27.solibpthread.so.0libresolv-2.27.solibresolv.so.2librt-2.27.solibrt.so.1libSegFault.solibthread_db-1.0.solibthread_db.so.1libutil-2.27.solibutil.so.1 from C project glibc(version:2.27) exposed 22 vulnerabilities: CVE-2015-8985, CVE-2019-7309, CVE-2020-1751, CVE-2020-10029, CVE-2019-9169, CVE-2019-6488, CVE-2020-6096, CVE-2020-1752, CVE-2020-27618, CVE-2021-3326, CVE-2021-33574, CVE-2019-25013, CVE-2021-38604, CVE-2021-35942, CVE-2019-19126, CVE-2019-9192, CVE-2018-20796, CVE-2009-5155, CVE-2016-10739, CVE-2018-11237, CVE-2017-18269, CVE-2018-11236,
Suggested Vulnerability Patch Versions
glibc has fixed the vulnerabilities in versions >=2.35
Python build tools cannot report vulnerable C libraries, which may induce potential security issues to many downstream Python projects. Could you please upgrade the above shared libraries to their patch versions?
Thanks for your help~
Best regards,
Joe Gardner
The text was updated successfully, but these errors were encountered:
Hi, @kvalakuzhyzp , @RCourt , I'd like to report a vulnerability issue in zelos_0.2.0.
Issue Description
zelos_0.2.0 directly or transitively depends on 111 C libraries (.so). However, I noticed that some C libraries are vulnerable, containing the following CVEs:
ld-linux-armhf.so.3
libc.so.6
ld-linux-x86-64.so.2
ld-2.27.so
ld-linux.so.2
libanl-2.27.so
libanl.so.1
libBrokenLocale-2.27.so
libBrokenLocale.so.1
libc-2.27.so
libcidn-2.27.so
libcidn.so.1
libcrypt-2.27.so
libcrypt.so.1
libdl-2.27.so
libdl.so.2
libm-2.27.so
libm.so.6
libmemusage.so
libnsl-2.27.so
libnsl.so.1
libnss_compat-2.27.so
libnss_compat.so.2
libnss_dns-2.27.so
libnss_dns.so.2
libnss_files-2.27.so
libnss_files.so.2
libnss_hesiod-2.27.so
libnss_hesiod.so.2
libnss_nis-2.27.so
libnss_nis.so.2
libnss_nisplus-2.27.so
libnss_nisplus.so.2
libpcprofile.so
libpthread-2.27.so
libpthread.so.0
libresolv-2.27.so
libresolv.so.2
librt-2.27.so
librt.so.1
libSegFault.so
libthread_db-1.0.so
libthread_db.so.1
libutil-2.27.so
libutil.so.1
from C project glibc(version:2.27) exposed 22 vulnerabilities:CVE-2015-8985, CVE-2019-7309, CVE-2020-1751, CVE-2020-10029, CVE-2019-9169, CVE-2019-6488, CVE-2020-6096, CVE-2020-1752, CVE-2020-27618, CVE-2021-3326, CVE-2021-33574, CVE-2019-25013, CVE-2021-38604, CVE-2021-35942, CVE-2019-19126, CVE-2019-9192, CVE-2018-20796, CVE-2009-5155, CVE-2016-10739, CVE-2018-11237, CVE-2017-18269, CVE-2018-11236,
Suggested Vulnerability Patch Versions
glibc has fixed the vulnerabilities in versions >=2.35
Python build tools cannot report vulnerable C libraries, which may induce potential security issues to many downstream Python projects. Could you please upgrade the above shared libraries to their patch versions?
Thanks for your help~
Best regards,
Joe Gardner
The text was updated successfully, but these errors were encountered: