Headline
RHSA-2022:7323: Red Hat Security Advisory: python3.9 security update
An update for python3.9 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2020-10735: python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
Synopsis
Moderate: python3.9 security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for python3.9 is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
- python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
Fixes
- BZ - 1834423 - CVE-2020-10735 python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
Red Hat Enterprise Linux for x86_64 9
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
x86_64
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 2beeff5bf70cda5abfa8ba8ccbbb727498ab12d0cb1dbaff99d61f48e8a04621
python3-devel-3.9.10-3.el9_0.i686.rpm
SHA-256: 17a9c153cbd0c8741bde5f38725a4cde4399e39496345c52f6072b0a60f2b8a9
python3-devel-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 9d0471e544f1fc648a209bae1347286c38a1ec1388fc9cbd8b6d1ab63659e150
python3-libs-3.9.10-3.el9_0.i686.rpm
SHA-256: 37a6d47cb354f1258279f0116d6719e8ac2ac5ce5ee92d9b741ba1bc6c8d86cf
python3-libs-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 0f32e2fb7be8a45613856d824512c7d60cbd7a7f4db6ddd6280d8aed4c6379bc
python3-tkinter-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 5b800a49b01cfbdd50440a15088336f36837a3d3836fc97ffdf3f6467dfd80dc
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
x86_64
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 2beeff5bf70cda5abfa8ba8ccbbb727498ab12d0cb1dbaff99d61f48e8a04621
python3-devel-3.9.10-3.el9_0.i686.rpm
SHA-256: 17a9c153cbd0c8741bde5f38725a4cde4399e39496345c52f6072b0a60f2b8a9
python3-devel-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 9d0471e544f1fc648a209bae1347286c38a1ec1388fc9cbd8b6d1ab63659e150
python3-libs-3.9.10-3.el9_0.i686.rpm
SHA-256: 37a6d47cb354f1258279f0116d6719e8ac2ac5ce5ee92d9b741ba1bc6c8d86cf
python3-libs-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 0f32e2fb7be8a45613856d824512c7d60cbd7a7f4db6ddd6280d8aed4c6379bc
python3-tkinter-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 5b800a49b01cfbdd50440a15088336f36837a3d3836fc97ffdf3f6467dfd80dc
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
Red Hat Enterprise Linux for IBM z Systems 9
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
s390x
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.s390x.rpm
SHA-256: 611dcb64fcd1a97ef539e0cd1981767adaf3c0e26b619e75523939155f7854ed
python3-devel-3.9.10-3.el9_0.s390x.rpm
SHA-256: 604f87d47bfd8da719c01e9a7d274e353350b0ffe215dbf99b1f25c5d72c22c4
python3-libs-3.9.10-3.el9_0.s390x.rpm
SHA-256: 2cfa14d27c6120dd42b8a4adc5c6ad4872903e38ce12e394b2d368b1eaafc65c
python3-tkinter-3.9.10-3.el9_0.s390x.rpm
SHA-256: 316e09ead5196cb6403b8f316d4ef9d0335aa2fe769ade34da1fcbaa822b0aab
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
s390x
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.s390x.rpm
SHA-256: 611dcb64fcd1a97ef539e0cd1981767adaf3c0e26b619e75523939155f7854ed
python3-devel-3.9.10-3.el9_0.s390x.rpm
SHA-256: 604f87d47bfd8da719c01e9a7d274e353350b0ffe215dbf99b1f25c5d72c22c4
python3-libs-3.9.10-3.el9_0.s390x.rpm
SHA-256: 2cfa14d27c6120dd42b8a4adc5c6ad4872903e38ce12e394b2d368b1eaafc65c
python3-tkinter-3.9.10-3.el9_0.s390x.rpm
SHA-256: 316e09ead5196cb6403b8f316d4ef9d0335aa2fe769ade34da1fcbaa822b0aab
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
Red Hat Enterprise Linux for Power, little endian 9
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
ppc64le
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 38500f390ea5eeeee7a654a4f5c8a578afcfa4bb4d1b7d1fb778f76499014916
python3-devel-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: bc1836950c05c2ecf44903d19a0773e4543063b8bedb0a40372e15c6af5613f0
python3-libs-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 4b9504bf3684c8663017fe0f06beee62bdafc5c7b8e3f0bb718c604b42e06b88
python3-tkinter-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: fac0ef4227272d0693b20a3dae2bd36bc1ca22bdeeffa86747bcba13b5fc9187
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
ppc64le
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 38500f390ea5eeeee7a654a4f5c8a578afcfa4bb4d1b7d1fb778f76499014916
python3-devel-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: bc1836950c05c2ecf44903d19a0773e4543063b8bedb0a40372e15c6af5613f0
python3-libs-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 4b9504bf3684c8663017fe0f06beee62bdafc5c7b8e3f0bb718c604b42e06b88
python3-tkinter-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: fac0ef4227272d0693b20a3dae2bd36bc1ca22bdeeffa86747bcba13b5fc9187
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
Red Hat Enterprise Linux for ARM 64 9
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
aarch64
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 539a0e77a645c63db5c35b41a92fbb474e2e6d158e050c3e8bac54d6bf013dc6
python3-devel-3.9.10-3.el9_0.aarch64.rpm
SHA-256: ae62a67f508263f33eafe64b9b337d5911af780099c02b00161101377233ab89
python3-libs-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 68bd99aab5d6b83c6e53760d70e13ed3a5309ed358ed8b85ecbf07c800159598
python3-tkinter-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 02636f3d8e755376ab2c0cf69eab577d194c40b1cfafcbec66d3d592136a9a76
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
ppc64le
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 38500f390ea5eeeee7a654a4f5c8a578afcfa4bb4d1b7d1fb778f76499014916
python3-devel-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: bc1836950c05c2ecf44903d19a0773e4543063b8bedb0a40372e15c6af5613f0
python3-libs-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 4b9504bf3684c8663017fe0f06beee62bdafc5c7b8e3f0bb718c604b42e06b88
python3-tkinter-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: fac0ef4227272d0693b20a3dae2bd36bc1ca22bdeeffa86747bcba13b5fc9187
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
x86_64
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 2beeff5bf70cda5abfa8ba8ccbbb727498ab12d0cb1dbaff99d61f48e8a04621
python3-devel-3.9.10-3.el9_0.i686.rpm
SHA-256: 17a9c153cbd0c8741bde5f38725a4cde4399e39496345c52f6072b0a60f2b8a9
python3-devel-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 9d0471e544f1fc648a209bae1347286c38a1ec1388fc9cbd8b6d1ab63659e150
python3-libs-3.9.10-3.el9_0.i686.rpm
SHA-256: 37a6d47cb354f1258279f0116d6719e8ac2ac5ce5ee92d9b741ba1bc6c8d86cf
python3-libs-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 0f32e2fb7be8a45613856d824512c7d60cbd7a7f4db6ddd6280d8aed4c6379bc
python3-tkinter-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 5b800a49b01cfbdd50440a15088336f36837a3d3836fc97ffdf3f6467dfd80dc
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
Red Hat CodeReady Linux Builder for x86_64 9
SRPM
x86_64
python3-3.9.10-3.el9_0.i686.rpm
SHA-256: faade38d577e17c436f296bba3deb65a47429253f22c651606596b8ead067667
python3-debug-3.9.10-3.el9_0.i686.rpm
SHA-256: e47294be0bb346b81fb121068826a9249d6204652bee4508212e525b4c1c7bde
python3-debug-3.9.10-3.el9_0.x86_64.rpm
SHA-256: b8e29e752feec5f435a68ab9a69230a57d572f564689a1c1dae2fccedb54de29
python3-idle-3.9.10-3.el9_0.i686.rpm
SHA-256: f13c7d3867ba1635fafcc8d0c98374fee4b75d4e7c45b926190ec9cb38e528a0
python3-idle-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 974bbdff86b22aa7ab7eff49cdf0a1320788a4b863795f47d9288df993a73980
python3-test-3.9.10-3.el9_0.i686.rpm
SHA-256: 83e78a93e94081214034f8fc3d5acfe227931264304be9014b22165710ed1486
python3-test-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 0c0e6e2286609d5fce2b5632de6b075f86221177907ed325886c95e9f057c4da
python3-tkinter-3.9.10-3.el9_0.i686.rpm
SHA-256: 488c6d7b2372addfab7891e876db8e5a15e36f7d517588540b494b9062b7ad6f
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
Red Hat CodeReady Linux Builder for Power, little endian 9
SRPM
ppc64le
python3-debug-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: a0c5a5626cffd028c18d7e59e484639b9b30b00eabe5061b8bc0eac749e26122
python3-idle-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: a3f27805c22501da7f0eed2f2260ec42163e852a85b944bd65a39027b21efdea
python3-test-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: fda3a53bf513bc00388c73d873e08427e95a6792b3e2d1ea378798a09a5a4805
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
Red Hat CodeReady Linux Builder for ARM 64 9
SRPM
aarch64
python3-debug-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 33ca8426b37103077d824649322c958d8d5fa199fe6b4a63f60b24cd52ad36fc
python3-idle-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 0de559219a472a776100d0cfa1df35c00079f118d30c8b2718e390ed33d4960d
python3-test-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 5c8aca0e8f9804e42a75d212e1ccfe67d148bbe94350ebd20544b585f95b00d4
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
Red Hat CodeReady Linux Builder for IBM z Systems 9
SRPM
s390x
python3-debug-3.9.10-3.el9_0.s390x.rpm
SHA-256: 652764d94c03ff70663a05efe5b3a3e12a36c30a83355b31c1de8ed7573a7ad3
python3-idle-3.9.10-3.el9_0.s390x.rpm
SHA-256: 672d9b519503aca5b377a04324e1b6f4a46ca28f0af721140f6327a1d679703c
python3-test-3.9.10-3.el9_0.s390x.rpm
SHA-256: 4ec2ff1a9f81981072e066b2067f50b78b892cc35c0d3438009c647c44b874d7
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
aarch64
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 539a0e77a645c63db5c35b41a92fbb474e2e6d158e050c3e8bac54d6bf013dc6
python3-devel-3.9.10-3.el9_0.aarch64.rpm
SHA-256: ae62a67f508263f33eafe64b9b337d5911af780099c02b00161101377233ab89
python3-libs-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 68bd99aab5d6b83c6e53760d70e13ed3a5309ed358ed8b85ecbf07c800159598
python3-tkinter-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 02636f3d8e755376ab2c0cf69eab577d194c40b1cfafcbec66d3d592136a9a76
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0
SRPM
x86_64
python3-3.9.10-3.el9_0.i686.rpm
SHA-256: faade38d577e17c436f296bba3deb65a47429253f22c651606596b8ead067667
python3-debug-3.9.10-3.el9_0.i686.rpm
SHA-256: e47294be0bb346b81fb121068826a9249d6204652bee4508212e525b4c1c7bde
python3-debug-3.9.10-3.el9_0.x86_64.rpm
SHA-256: b8e29e752feec5f435a68ab9a69230a57d572f564689a1c1dae2fccedb54de29
python3-idle-3.9.10-3.el9_0.i686.rpm
SHA-256: f13c7d3867ba1635fafcc8d0c98374fee4b75d4e7c45b926190ec9cb38e528a0
python3-idle-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 974bbdff86b22aa7ab7eff49cdf0a1320788a4b863795f47d9288df993a73980
python3-test-3.9.10-3.el9_0.i686.rpm
SHA-256: 83e78a93e94081214034f8fc3d5acfe227931264304be9014b22165710ed1486
python3-test-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 0c0e6e2286609d5fce2b5632de6b075f86221177907ed325886c95e9f057c4da
python3-tkinter-3.9.10-3.el9_0.i686.rpm
SHA-256: 488c6d7b2372addfab7891e876db8e5a15e36f7d517588540b494b9062b7ad6f
python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm
SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126
python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328
python3.9-debugsource-3.9.10-3.el9_0.i686.rpm
SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972
python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm
SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0
SRPM
ppc64le
python3-debug-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: a0c5a5626cffd028c18d7e59e484639b9b30b00eabe5061b8bc0eac749e26122
python3-idle-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: a3f27805c22501da7f0eed2f2260ec42163e852a85b944bd65a39027b21efdea
python3-test-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: fda3a53bf513bc00388c73d873e08427e95a6792b3e2d1ea378798a09a5a4805
python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3
python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm
SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0
SRPM
s390x
python3-debug-3.9.10-3.el9_0.s390x.rpm
SHA-256: 652764d94c03ff70663a05efe5b3a3e12a36c30a83355b31c1de8ed7573a7ad3
python3-idle-3.9.10-3.el9_0.s390x.rpm
SHA-256: 672d9b519503aca5b377a04324e1b6f4a46ca28f0af721140f6327a1d679703c
python3-test-3.9.10-3.el9_0.s390x.rpm
SHA-256: 4ec2ff1a9f81981072e066b2067f50b78b892cc35c0d3438009c647c44b874d7
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0
SRPM
aarch64
python3-debug-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 33ca8426b37103077d824649322c958d8d5fa199fe6b4a63f60b24cd52ad36fc
python3-idle-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 0de559219a472a776100d0cfa1df35c00079f118d30c8b2718e390ed33d4960d
python3-test-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 5c8aca0e8f9804e42a75d212e1ccfe67d148bbe94350ebd20544b585f95b00d4
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
aarch64
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 539a0e77a645c63db5c35b41a92fbb474e2e6d158e050c3e8bac54d6bf013dc6
python3-devel-3.9.10-3.el9_0.aarch64.rpm
SHA-256: ae62a67f508263f33eafe64b9b337d5911af780099c02b00161101377233ab89
python3-libs-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 68bd99aab5d6b83c6e53760d70e13ed3a5309ed358ed8b85ecbf07c800159598
python3-tkinter-3.9.10-3.el9_0.aarch64.rpm
SHA-256: 02636f3d8e755376ab2c0cf69eab577d194c40b1cfafcbec66d3d592136a9a76
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm
SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm
SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84
Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0
SRPM
python3.9-3.9.10-3.el9_0.src.rpm
SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987
s390x
python-unversioned-command-3.9.10-3.el9_0.noarch.rpm
SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55
python3-3.9.10-3.el9_0.s390x.rpm
SHA-256: 611dcb64fcd1a97ef539e0cd1981767adaf3c0e26b619e75523939155f7854ed
python3-devel-3.9.10-3.el9_0.s390x.rpm
SHA-256: 604f87d47bfd8da719c01e9a7d274e353350b0ffe215dbf99b1f25c5d72c22c4
python3-libs-3.9.10-3.el9_0.s390x.rpm
SHA-256: 2cfa14d27c6120dd42b8a4adc5c6ad4872903e38ce12e394b2d368b1eaafc65c
python3-tkinter-3.9.10-3.el9_0.s390x.rpm
SHA-256: 316e09ead5196cb6403b8f316d4ef9d0335aa2fe769ade34da1fcbaa822b0aab
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm
SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm
SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035
Related news
IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.16.0could allow an authenticated user to obtain sensitive version information that could aid in further attacks against the system. IBM X-Force ID: 233665.
Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).
Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
An update for the python38:3.8 and python38-devel:3.8 modules is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-10735: A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not a...
Red Hat Advanced Cluster Management for Kubernetes 2.5.8 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.
Multicluster Engine for Kubernetes 2.1.6 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.11.7 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-40186: A flaw was found in HashiCorp Vault and Vault Enterprise, where they could allow a locally authenticated attacker to gain unauthorized access to the system, caused by a flaw in the alias naming schema implementation for mount accessors with shared alias n...
Red Hat Security Advisory 2023-1816-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...
Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...
Red Hat Security Advisory 2023-1448-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.
Red Hat Security Advisory 2023-1454-01 - An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Moderate.
An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41354: An information disclosure flaw was found in Argo CD. This issue may allow unauthorized users to enumerate application names by inspecting API error messages and could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant ...
An update is now available for Red Hat OpenShift GitOps 1.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41354: An information disclosure flaw was found in Argo CD. This issue may allow unauthorized users to enumerate application names by inspecting API error messages and could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant ...
The Migration Toolkit for Containers (MTC) 1.7.8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2022-24999: A flaw was found in the express.js npm package. Express.js Express is vulnerable to a d...
Red Hat Security Advisory 2023-0931-01 - Update information for Logging Subsystem 5.4.12 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.
Red Hat Security Advisory 2023-0932-01 - Update information for Logging Subsystem 5.6.3 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.
Red Hat Security Advisory 2023-1170-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat Security Advisory 2023-0930-01 - Update information for Logging Subsystem 5.5.8 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.
Logging Subsystem 5.4.12 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to alloc...
Logging Subsystem 5.5.8 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&...
Red Hat OpenShift Data Foundation 4.12.1 Bug Fix Update Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issue significantly reduces the amount of entropy generated in short strings by these functions.
Logging Subsystem 5.6.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&...
Dell PowerScale OneFS 9.4.0.x contains exposure of sensitive information to an unauthorized actor. A malicious authenticated local user could potentially exploit this vulnerability in certificate management, leading to a potential system takeover.
Red Hat Security Advisory 2023-0833-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include denial of service, information leakage, and open redirection vulnerabilities.
An update for python3 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-10735: A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this v...
Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.
Red Hat Security Advisory 2022-7323-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2022-6766-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include denial of service, information leakage, and open redirection vulnerabilities.
An update for rh-python38-python is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2015-20107: python(mailcap): findmatch() function does not sanitise the second argument * CVE-2020-10735: python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS * CVE-2021-28861: python: an open redirection vulnerability in lib/http/server.py may lead to information disclosure
A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.