{"schema_version":"1.7.2","id":"OESA-2026-2199","modified":"2026-05-09T12:30:28Z","published":"2026-05-09T12:30:28Z","upstream":["CVE-2026-28684"],"summary":"python-dotenv security update","details":"Python-dotenv reads key-value pairs from a .env file and can set them as environment variables. It helps in the development of applications following the 12-factor principles.\r\n\r\nSecurity Fix(es):\n\npython-dotenv reads key-value pairs from a .env file and can set them as environment variables. Prior to version 1.2.2, `set_key()` and `unset_key()` in python-dotenv follow symbolic links when rewriting `.env` files, allowing a local attacker to overwrite arbitrary files via a crafted symlink when a cross-device rename fallback is triggered. Users should upgrade to v.1.2.2 or, as a workaround, apply the patch manually.(CVE-2026-28684)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP1","name":"python-dotenv","purl":"pkg:rpm/openEuler/python-dotenv&distro=openEuler-24.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.2-1.oe2403sp1"}]}],"ecosystem_specific":{"noarch":["python-dotenv-help-1.2.2-1.oe2403sp1.noarch.rpm","python3-dotenv-1.2.2-1.oe2403sp1.noarch.rpm"],"src":["python-dotenv-1.2.2-1.oe2403sp1.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2199"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28684"}],"database_specific":{"severity":"Medium"}}
