vulnerability
Rocky Linux: CVE-2024-47081: resource-agents (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:H/Au:N/C:C/I:N/A:N) | Sep 8, 2025 | Feb 5, 2026 | Feb 9, 2026 |
Severity
5
CVSS
(AV:N/AC:H/Au:N/C:C/I:N/A:N)
Published
Sep 8, 2025
Added
Feb 5, 2026
Modified
Feb 9, 2026
Description
Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session.
Solutions
rocky-upgrade-fence-agents-aliyunrocky-upgrade-fence-agents-aliyun-debuginforocky-upgrade-fence-agents-allrocky-upgrade-fence-agents-azure-armrocky-upgrade-fence-agents-azure-arm-debuginforocky-upgrade-fence-agents-debuginforocky-upgrade-fence-agents-debugsourcerocky-upgrade-fence-agents-kdumprocky-upgrade-fence-agents-kdump-debuginforocky-upgrade-fence-agents-kubevirtrocky-upgrade-fence-agents-kubevirt-debuginforocky-upgrade-fence-agents-openstackrocky-upgrade-fence-agents-redfishrocky-upgrade-resource-agentsrocky-upgrade-resource-agents-aliyunrocky-upgrade-resource-agents-aliyun-debuginforocky-upgrade-resource-agents-debuginforocky-upgrade-resource-agents-debugsourcerocky-upgrade-resource-agents-gcprocky-upgrade-resource-agents-paf
References
- CVE-2024-47081
- https://attackerkb.com/topics/CVE-2024-47081
- CWE-522
- URL-https://errata.rockylinux.org/RLSA-2025:12519
- URL-https://errata.rockylinux.org/RLSA-2025:13234
- URL-https://errata.rockylinux.org/RLSA-2025:13604
- URL-https://errata.rockylinux.org/RLSA-2025:14750
- URL-https://errata.rockylinux.org/RLSA-2025:14999
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.