rpm package
suse/python-PyJWT&distro=SUSE Linux Enterprise Server 15 SP1-BCL
pkg:rpm/suse/python-PyJWT&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCL
Vulnerabilities (3)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-29217 | — | < 1.7.1-150100.6.7.1 | 1.7.1-150100.6.7.1 | May 24, 2022 | PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The | ||
| CVE-2020-14343 | — | < 1.7.1-6.4.1 | 1.7.1-6.4.1 | Feb 9, 2021 | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrust | ||
| CVE-2020-25659 | — | < 1.7.1-6.4.1 | 1.7.1-6.4.1 | Jan 11, 2021 | python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext. |
- CVE-2022-29217May 24, 2022affected < 1.7.1-150100.6.7.1fixed 1.7.1-150100.6.7.1
PyJWT is a Python implementation of RFC 7519. PyJWT supports multiple different JWT signing algorithms. With JWT, an attacker submitting the JWT token can choose the used signing algorithm. The PyJWT library requires that the application chooses what algorithms are supported. The
- CVE-2020-14343Feb 9, 2021affected < 1.7.1-6.4.1fixed 1.7.1-6.4.1
A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrust
- CVE-2020-25659Jan 11, 2021affected < 1.7.1-6.4.1fixed 1.7.1-6.4.1
python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext.