CVE-2023-5625

A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
redhatCNA
5.3 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
VendorProductVersion
redhatopenshift_container_platform_for_arm64
4.12
redhatopenshift_container_platform_for_linuxone
4.12
redhatopenshift_container_platform_for_power
4.12
redhatopenshift_container_platform_ibm_z_systems
4.12
redhatopenstack_platform
17.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-eventlet
bullseye
0.26.1-7+deb11u1
fixed
bookworm
0.33.1-4
fixed
sid
0.36.1-11
fixed
trixie
0.36.1-11
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-eventlet
mantic
not-affected
lunar
not-affected
jammy
not-affected
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
ignored