Headline
RHSA-2023:4203: Red Hat Security Advisory: python3.9 security update
An update for python3.9 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Synopsis
Important: python3.9 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for python3.9 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
- python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
Fixes
- BZ - 2173917 - CVE-2023-24329 python: urllib.parse url blocklisting bypass
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
x86_64
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: c97b68c9712eff1897ba6b89ec84b7d72c2ad71c88a914dcf6b14c76d0e91ac3
python3-devel-3.9.10-4.el9_0.1.i686.rpm
SHA-256: b9d0c8d16bcddab390da97e17797267b2a55e1773e853fd8f7cb3cc7c44910c2
python3-devel-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 921ec79aa24e03e6d7ed2e718de2d1869444dad4457a3babd56762439cfa63b4
python3-libs-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 8a81d6588382883dd8a4c019114061b62b065321f341591ada1ef59807e08ad5
python3-libs-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 896877471f8fff6099febfa2c5cfc2408281b07ec2b9e880f3e7ac01f74f0d2e
python3-tkinter-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: b74eb2e883871d6119a4deb5675f3c03b0a86ffd718875395be83f02f592c51c
python3.9-debuginfo-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 91bcd7f75829427cfbc66a313edb5bc347810f920cf59f368c0fe45fc4dfe12d
python3.9-debuginfo-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 91bcd7f75829427cfbc66a313edb5bc347810f920cf59f368c0fe45fc4dfe12d
python3.9-debuginfo-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: a7fa17db9bde38c298bdb496a549505466f0ab424a1b7323b5c712097daacbf2
python3.9-debuginfo-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: a7fa17db9bde38c298bdb496a549505466f0ab424a1b7323b5c712097daacbf2
python3.9-debugsource-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 7d4d0e373bfb53a128783e1dca6d70c1089c87f09cf3f48f48fa9e64fa1b084f
python3.9-debugsource-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 7d4d0e373bfb53a128783e1dca6d70c1089c87f09cf3f48f48fa9e64fa1b084f
python3.9-debugsource-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 246a1c892cbd3de4bb2c7fac36bce4ec7cb728732b6b900a389cdc911fc98d3b
python3.9-debugsource-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 246a1c892cbd3de4bb2c7fac36bce4ec7cb728732b6b900a389cdc911fc98d3b
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
s390x
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 2203877d2afc495a2bdb2313547711ee8ff5aa352ecd6e1dad7b77b7991108ca
python3-devel-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 49f69462467f6dfc0880162c303a76bb99384f534574cf22ce589809b9346df2
python3-libs-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 82b02f2f9cb6696cdc344174f1cd8f6e936e58c39735928153197b3baab7c801
python3-tkinter-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 8a28e98fba5ce2cb12793c4f1b16f2b1f4ab95d6cf55ef5f6f6be1dbec6121a1
python3.9-debuginfo-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 9c55cd2ae942abfffc8c255e027c52138a12f6b72867496363e31518c440899d
python3.9-debuginfo-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 9c55cd2ae942abfffc8c255e027c52138a12f6b72867496363e31518c440899d
python3.9-debugsource-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 2bf8391e96cb3e0523e64b0daf71deb967ed11d99c41fb7ec1cc2b99f9933248
python3.9-debugsource-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 2bf8391e96cb3e0523e64b0daf71deb967ed11d99c41fb7ec1cc2b99f9933248
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
ppc64le
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 3cf05afea8c26b26735685af2839f56cfa6b2412933450a52fa09361b090f099
python3-devel-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2df09bf19a2af7c9b39b10fd0dff71cd97a4a28b85f7898008d7864d3daa6dd6
python3-libs-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 315cdddd17f506c0f05d5f940a3be82a64549b9e5f7e9a0e0a8a0cbe70cfac85
python3-tkinter-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 1959520aab8c2bba5080c352cba95fcbd801ceb506f34d6a642131c245a091f5
python3.9-debuginfo-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2fde2abe1712a0396ee60f62339d7dc0cb7539cff92652293a472d96a3797d03
python3.9-debuginfo-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2fde2abe1712a0396ee60f62339d7dc0cb7539cff92652293a472d96a3797d03
python3.9-debugsource-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2a67b81a40be6a9301be4132a9e3d37f0c9f5afa1be051df913e2477ef4a79d2
python3.9-debugsource-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2a67b81a40be6a9301be4132a9e3d37f0c9f5afa1be051df913e2477ef4a79d2
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
aarch64
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 90e3f3ccaa94c671cf3ec885e7bca443be5f310236fa0cf6277a5fe45a3acc40
python3-devel-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 387d0156f167ac0e412bcac7d3f9c2087682bdfaf7bfcde3c1b9d5447381d0ad
python3-libs-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 666e736b6f2e83f3764755efec2c4696c04c24cc94f5bc45cfc8974296aeee3a
python3-tkinter-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: f00bb6038ae8aef26b463aff52a4d361fb6b08c28984c748ecb2e32e0b12a5da
python3.9-debuginfo-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 36af25934a8d6ec70c9d65d0e4610b4a2a8c80dfbdc1f8602db1b228394568bb
python3.9-debuginfo-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 36af25934a8d6ec70c9d65d0e4610b4a2a8c80dfbdc1f8602db1b228394568bb
python3.9-debugsource-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 5fb43076ec63160b3eaf32497fc1d8d12f9fa5c202a9e3a819e94770afba3b1b
python3.9-debugsource-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 5fb43076ec63160b3eaf32497fc1d8d12f9fa5c202a9e3a819e94770afba3b1b
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
ppc64le
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 3cf05afea8c26b26735685af2839f56cfa6b2412933450a52fa09361b090f099
python3-devel-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2df09bf19a2af7c9b39b10fd0dff71cd97a4a28b85f7898008d7864d3daa6dd6
python3-libs-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 315cdddd17f506c0f05d5f940a3be82a64549b9e5f7e9a0e0a8a0cbe70cfac85
python3-tkinter-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 1959520aab8c2bba5080c352cba95fcbd801ceb506f34d6a642131c245a091f5
python3.9-debuginfo-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2fde2abe1712a0396ee60f62339d7dc0cb7539cff92652293a472d96a3797d03
python3.9-debuginfo-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2fde2abe1712a0396ee60f62339d7dc0cb7539cff92652293a472d96a3797d03
python3.9-debugsource-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2a67b81a40be6a9301be4132a9e3d37f0c9f5afa1be051df913e2477ef4a79d2
python3.9-debugsource-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2a67b81a40be6a9301be4132a9e3d37f0c9f5afa1be051df913e2477ef4a79d2
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
x86_64
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: c97b68c9712eff1897ba6b89ec84b7d72c2ad71c88a914dcf6b14c76d0e91ac3
python3-devel-3.9.10-4.el9_0.1.i686.rpm
SHA-256: b9d0c8d16bcddab390da97e17797267b2a55e1773e853fd8f7cb3cc7c44910c2
python3-devel-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 921ec79aa24e03e6d7ed2e718de2d1869444dad4457a3babd56762439cfa63b4
python3-libs-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 8a81d6588382883dd8a4c019114061b62b065321f341591ada1ef59807e08ad5
python3-libs-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 896877471f8fff6099febfa2c5cfc2408281b07ec2b9e880f3e7ac01f74f0d2e
python3-tkinter-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: b74eb2e883871d6119a4deb5675f3c03b0a86ffd718875395be83f02f592c51c
python3.9-debuginfo-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 91bcd7f75829427cfbc66a313edb5bc347810f920cf59f368c0fe45fc4dfe12d
python3.9-debuginfo-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 91bcd7f75829427cfbc66a313edb5bc347810f920cf59f368c0fe45fc4dfe12d
python3.9-debuginfo-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: a7fa17db9bde38c298bdb496a549505466f0ab424a1b7323b5c712097daacbf2
python3.9-debuginfo-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: a7fa17db9bde38c298bdb496a549505466f0ab424a1b7323b5c712097daacbf2
python3.9-debugsource-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 7d4d0e373bfb53a128783e1dca6d70c1089c87f09cf3f48f48fa9e64fa1b084f
python3.9-debugsource-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 7d4d0e373bfb53a128783e1dca6d70c1089c87f09cf3f48f48fa9e64fa1b084f
python3.9-debugsource-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 246a1c892cbd3de4bb2c7fac36bce4ec7cb728732b6b900a389cdc911fc98d3b
python3.9-debugsource-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 246a1c892cbd3de4bb2c7fac36bce4ec7cb728732b6b900a389cdc911fc98d3b
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0
SRPM
x86_64
python3-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 9473705b3ddd69ca7a998a91f2f52df5680fce2f8c9029289286197b93669d4c
python3-debug-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 98c4db44c01a0bc558160af6c7c46fcf31a5476aebf74bc61f851d9ecf171415
python3-debug-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 23f9b46787125ac71d455850796d83c2e38ae8efde565a4de8da854bf8bb5bdf
python3-idle-3.9.10-4.el9_0.1.i686.rpm
SHA-256: feb555c2e05b4f97b22199e0ec1ef66b062d1f91a8fd2d18aa424b2887cb3157
python3-idle-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 6509f4a82979d369d3e5c7da22395208ca5981607dd3e663bebcc413820b3dab
python3-test-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 4a48e3d72574a82f18088a73100a7ee519af805b62eb5dc9c5265837cc908b3b
python3-test-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: e787c2cdd00acae0b3a5333b8662460a81eafc26f8ec027bbadc46dcbca636c9
python3-tkinter-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 990ab99b48929285ca09d540c7b01990e4c9da419db6b24b5886de114694cca6
python3.9-debuginfo-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 91bcd7f75829427cfbc66a313edb5bc347810f920cf59f368c0fe45fc4dfe12d
python3.9-debuginfo-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: a7fa17db9bde38c298bdb496a549505466f0ab424a1b7323b5c712097daacbf2
python3.9-debugsource-3.9.10-4.el9_0.1.i686.rpm
SHA-256: 7d4d0e373bfb53a128783e1dca6d70c1089c87f09cf3f48f48fa9e64fa1b084f
python3.9-debugsource-3.9.10-4.el9_0.1.x86_64.rpm
SHA-256: 246a1c892cbd3de4bb2c7fac36bce4ec7cb728732b6b900a389cdc911fc98d3b
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0
SRPM
ppc64le
python3-debug-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 0efe9334054a7fadd1f1fb71fee1dc5dacad049327fe7da2a67fccf5b2ea9d38
python3-idle-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: aa16305b600eb39c04984ac2f7f958d777f3f3128217d5f407cee7934cd0a025
python3-test-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 8762ba3b946db4e92e741b89bb7538c839d16ae0d7b2c27c4ccd44cb9bbb3ee6
python3.9-debuginfo-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2fde2abe1712a0396ee60f62339d7dc0cb7539cff92652293a472d96a3797d03
python3.9-debugsource-3.9.10-4.el9_0.1.ppc64le.rpm
SHA-256: 2a67b81a40be6a9301be4132a9e3d37f0c9f5afa1be051df913e2477ef4a79d2
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0
SRPM
s390x
python3-debug-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 9f73dd91ef8ff28c33a843354b153e768da6cf06f81df9f1a2ce461fed28770e
python3-idle-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: e58318a4a8f83f1e09dc5c348898e4d7c3c3f6363fcba68de6d381a61e89fa89
python3-test-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 8b433e823043fdaa9ac7733eee8feeccbeaad84bd260a170c20c39601d4be311
python3.9-debuginfo-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 9c55cd2ae942abfffc8c255e027c52138a12f6b72867496363e31518c440899d
python3.9-debugsource-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 2bf8391e96cb3e0523e64b0daf71deb967ed11d99c41fb7ec1cc2b99f9933248
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0
SRPM
aarch64
python3-debug-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 27c39edf9959543504394995f0d74809cba5aa8422f643a160c7f3d547586dc0
python3-idle-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 56428803031c1308305fee01f27c46c83ed5486d346d7c778846400ad8cd4998
python3-test-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: cc8a9eddb094c0b5655f3a67de3de2407ff49360d3444f3d37240ea293a7ab7b
python3.9-debuginfo-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 36af25934a8d6ec70c9d65d0e4610b4a2a8c80dfbdc1f8602db1b228394568bb
python3.9-debugsource-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 5fb43076ec63160b3eaf32497fc1d8d12f9fa5c202a9e3a819e94770afba3b1b
Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
aarch64
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 90e3f3ccaa94c671cf3ec885e7bca443be5f310236fa0cf6277a5fe45a3acc40
python3-devel-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 387d0156f167ac0e412bcac7d3f9c2087682bdfaf7bfcde3c1b9d5447381d0ad
python3-libs-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 666e736b6f2e83f3764755efec2c4696c04c24cc94f5bc45cfc8974296aeee3a
python3-tkinter-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: f00bb6038ae8aef26b463aff52a4d361fb6b08c28984c748ecb2e32e0b12a5da
python3.9-debuginfo-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 36af25934a8d6ec70c9d65d0e4610b4a2a8c80dfbdc1f8602db1b228394568bb
python3.9-debuginfo-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 36af25934a8d6ec70c9d65d0e4610b4a2a8c80dfbdc1f8602db1b228394568bb
python3.9-debugsource-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 5fb43076ec63160b3eaf32497fc1d8d12f9fa5c202a9e3a819e94770afba3b1b
python3.9-debugsource-3.9.10-4.el9_0.1.aarch64.rpm
SHA-256: 5fb43076ec63160b3eaf32497fc1d8d12f9fa5c202a9e3a819e94770afba3b1b
Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0
SRPM
python3.9-3.9.10-4.el9_0.1.src.rpm
SHA-256: d0479c1f0a1831d2d5d336e6124188078d0c6e1f99b530763025fb0c19e1fe1b
s390x
python-unversioned-command-3.9.10-4.el9_0.1.noarch.rpm
SHA-256: b71f9f92f89fa8d535fca903e573e078bc569e4587a2633cb4d1bee8a1da2aa6
python3-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 2203877d2afc495a2bdb2313547711ee8ff5aa352ecd6e1dad7b77b7991108ca
python3-devel-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 49f69462467f6dfc0880162c303a76bb99384f534574cf22ce589809b9346df2
python3-libs-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 82b02f2f9cb6696cdc344174f1cd8f6e936e58c39735928153197b3baab7c801
python3-tkinter-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 8a28e98fba5ce2cb12793c4f1b16f2b1f4ab95d6cf55ef5f6f6be1dbec6121a1
python3.9-debuginfo-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 9c55cd2ae942abfffc8c255e027c52138a12f6b72867496363e31518c440899d
python3.9-debuginfo-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 9c55cd2ae942abfffc8c255e027c52138a12f6b72867496363e31518c440899d
python3.9-debugsource-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 2bf8391e96cb3e0523e64b0daf71deb967ed11d99c41fb7ec1cc2b99f9933248
python3.9-debugsource-3.9.10-4.el9_0.1.s390x.rpm
SHA-256: 2bf8391e96cb3e0523e64b0daf71deb967ed11d99c41fb7ec1cc2b99f9933248
Related news
Good cyber security practices depend on trustworthy information sources about security vulnerabilities. This article offers guidance around who to trust for this information.In 1999, MITRE Corporation, a US Government-funded research and development company, realized the world needed a uniform standard for reporting and tracking software security bugs. MITRE worked with the IT industry to invent a concept called CVE, for Common Vulnerabilities and Exposures. The CVE concept caught on, and today, the industry acknowledges CVE as the universal standard for security vulnerability reporting.Softw
Red Hat Security Advisory 2023-4972-01 - Multicluster Engine for Kubernetes 2.1.8 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-4576-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters.
Red Hat Security Advisory 2023-4472-01 - Version 1.29.1 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.10, 4.11, 4.12, and 4.13. This release includes security and bug fixes, and enhancements.
Red Hat OpenShift Container Platform release 4.11.46 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: A flaw was found in golang. The language package for go language can panic due to an out-of-bounds read when an incorrectly formatted language tag is being parsed. This flaw allows a...
Red Hat Security Advisory 2023-4226-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.6.
Red Hat Security Advisory 2023-4225-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.13.6.
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.5 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
Red Hat Security Advisory 2023-4091-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.5. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-4238-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...
Red Hat Security Advisory 2023-4204-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. After deploying the VolSync operator, it can create and maintain copies of your persistent data.
Red Hat Security Advisory 2023-4038-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-4032-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-3888-01 - Red Hat Single Sign-On is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat Single Sign-On for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services. This erratum releases a new image for Red Hat Single Sign-On 7.6.4 for use within the OpenShift Container Platform 3.10, OpenShift Container Platform 3.11, and within the OpenShift Container Platform 4.12 cloud computing Platform-as-a-Service for on-premise or private cloud deployments, aligning with the standalone product release. Issues addressed include a cross site scripting vulnerability.
Red Hat Security Advisory 2023-3781-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
An update for python3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Red Hat Security Advisory 2023-3614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4.
Red Hat Security Advisory 2023-3780-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-3664-01 - Release of Security Advisory for the OpenShift Jenkins image and Jenkins agent base image.
Red Hat Security Advisory 2023-3555-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Ubuntu Security Notice 5888-1 - It was discovered that Python incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to execute arbitrary code. Hamza Avvan discovered that Python incorrectly handled certain inputs. If a user or an automated system were tricked into running a specially crafted input, a remote attacker could possibly use this issue to execute arbitrary code.