Rapid7 Vulnerability & Exploit Database

Rocky Linux: CVE-2021-3572: python38-3.8-and-python38-devel-3.8 (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Rocky Linux: CVE-2021-3572: python38-3.8-and-python38-devel-3.8 (Multiple Advisories)

Severity
4
CVSS
(AV:N/AC:M/Au:S/C:N/I:P/A:N)
Published
11/10/2021
Created
03/13/2024
Added
03/12/2024
Modified
11/20/2024

Description

A flaw was found in python-pip in the way it handled Unicode separators in git references. A remote attacker could possibly use this issue to install a different revision on a repository. The highest threat from this vulnerability is to data integrity. This is fixed in python-pip version 21.1.

Solution(s)

  • rocky-upgrade-cython-debugsource
  • rocky-upgrade-numpy-debugsource
  • rocky-upgrade-python-cffi-debugsource
  • rocky-upgrade-python-cryptography-debugsource
  • rocky-upgrade-python-lxml-debugsource
  • rocky-upgrade-python-markupsafe-debugsource
  • rocky-upgrade-python-psutil-debugsource
  • rocky-upgrade-python-psycopg2-debugsource
  • rocky-upgrade-python38
  • rocky-upgrade-python38-cffi
  • rocky-upgrade-python38-cffi-debuginfo
  • rocky-upgrade-python38-cryptography
  • rocky-upgrade-python38-cryptography-debuginfo
  • rocky-upgrade-python38-cython
  • rocky-upgrade-python38-cython-debuginfo
  • rocky-upgrade-python38-debug
  • rocky-upgrade-python38-debuginfo
  • rocky-upgrade-python38-debugsource
  • rocky-upgrade-python38-devel
  • rocky-upgrade-python38-idle
  • rocky-upgrade-python38-libs
  • rocky-upgrade-python38-lxml
  • rocky-upgrade-python38-lxml-debuginfo
  • rocky-upgrade-python38-markupsafe
  • rocky-upgrade-python38-markupsafe-debuginfo
  • rocky-upgrade-python38-mod_wsgi
  • rocky-upgrade-python38-numpy
  • rocky-upgrade-python38-numpy-debuginfo
  • rocky-upgrade-python38-numpy-f2py
  • rocky-upgrade-python38-psutil
  • rocky-upgrade-python38-psutil-debuginfo
  • rocky-upgrade-python38-psycopg2
  • rocky-upgrade-python38-psycopg2-debuginfo
  • rocky-upgrade-python38-psycopg2-doc
  • rocky-upgrade-python38-psycopg2-tests
  • rocky-upgrade-python38-pyyaml
  • rocky-upgrade-python38-pyyaml-debuginfo
  • rocky-upgrade-python38-scipy
  • rocky-upgrade-python38-scipy-debuginfo
  • rocky-upgrade-python38-test
  • rocky-upgrade-python38-tkinter
  • rocky-upgrade-python39
  • rocky-upgrade-python39-cffi
  • rocky-upgrade-python39-cffi-debuginfo
  • rocky-upgrade-python39-cryptography
  • rocky-upgrade-python39-cryptography-debuginfo
  • rocky-upgrade-python39-cython
  • rocky-upgrade-python39-cython-debuginfo
  • rocky-upgrade-python39-debug
  • rocky-upgrade-python39-debuginfo
  • rocky-upgrade-python39-debugsource
  • rocky-upgrade-python39-devel
  • rocky-upgrade-python39-idle
  • rocky-upgrade-python39-libs
  • rocky-upgrade-python39-lxml
  • rocky-upgrade-python39-lxml-debuginfo
  • rocky-upgrade-python39-mod_wsgi
  • rocky-upgrade-python39-numpy
  • rocky-upgrade-python39-numpy-debuginfo
  • rocky-upgrade-python39-numpy-f2py
  • rocky-upgrade-python39-psutil
  • rocky-upgrade-python39-psutil-debuginfo
  • rocky-upgrade-python39-psycopg2
  • rocky-upgrade-python39-psycopg2-debuginfo
  • rocky-upgrade-python39-psycopg2-doc
  • rocky-upgrade-python39-psycopg2-tests
  • rocky-upgrade-python39-pybind11
  • rocky-upgrade-python39-pybind11-devel
  • rocky-upgrade-python39-pyyaml
  • rocky-upgrade-python39-pyyaml-debuginfo
  • rocky-upgrade-python39-scipy
  • rocky-upgrade-python39-scipy-debuginfo
  • rocky-upgrade-python39-test
  • rocky-upgrade-python39-tkinter
  • rocky-upgrade-pyyaml-debugsource
  • rocky-upgrade-scipy-debugsource

insightVM

Advanced vulnerability management analytics and reporting.
Key Features
  • Lightweight Endpoint Agent
  • Live Dashboards
  • Real Risk Prioritization
  • IT-Integrated Remediation Projects
  • Cloud, Virtual, and Container Assessment
  • Integrated Threat Feeds
  • Easy-to-Use RESTful API
  • Automation-Assisted Patching
  • Automated Containment
Free InsightVM Trial View All Features

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;