{"schema_version":"1.7.2","id":"OESA-2026-2198","modified":"2026-05-09T12:30:27Z","published":"2026-05-09T12:30:27Z","upstream":["CVE-2026-28684"],"summary":"python-dotenv security update","details":"Python-dotenv reads key-value pairs from a .env file and can set them as environment variables. It helps in the development of applications following the 12-factor principles.\r\n\r\nSecurity Fix(es):\n\npython-dotenv reads key-value pairs from a .env file and can set them as environment variables. Prior to version 1.2.2, `set_key()` and `unset_key()` in python-dotenv follow symbolic links when rewriting `.env` files, allowing a local attacker to overwrite arbitrary files via a crafted symlink when a cross-device rename fallback is triggered. Users should upgrade to v.1.2.2 or, as a workaround, apply the patch manually.(CVE-2026-28684)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"python-dotenv","purl":"pkg:rpm/openEuler/python-dotenv&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.2.2-1.oe2403"}]}],"ecosystem_specific":{"noarch":["python-dotenv-help-1.2.2-1.oe2403.noarch.rpm","python3-dotenv-1.2.2-1.oe2403.noarch.rpm"],"src":["python-dotenv-1.2.2-1.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2198"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-28684"}],"database_specific":{"severity":"Medium"}}
