Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:7323: Red Hat Security Advisory: python3.9 security update

An update for python3.9 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2020-10735: python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS
Red Hat Security Data
#vulnerability#linux#red_hat#git#ibm#sap

Synopsis

Moderate: python3.9 security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for python3.9 is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

  • python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS (CVE-2020-10735)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for x86_64 9 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
  • Red Hat CodeReady Linux Builder for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
  • Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0 s390x
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
  • Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 1834423 - CVE-2020-10735 python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS

Red Hat Enterprise Linux for x86_64 9

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

x86_64

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 2beeff5bf70cda5abfa8ba8ccbbb727498ab12d0cb1dbaff99d61f48e8a04621

python3-devel-3.9.10-3.el9_0.i686.rpm

SHA-256: 17a9c153cbd0c8741bde5f38725a4cde4399e39496345c52f6072b0a60f2b8a9

python3-devel-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 9d0471e544f1fc648a209bae1347286c38a1ec1388fc9cbd8b6d1ab63659e150

python3-libs-3.9.10-3.el9_0.i686.rpm

SHA-256: 37a6d47cb354f1258279f0116d6719e8ac2ac5ce5ee92d9b741ba1bc6c8d86cf

python3-libs-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 0f32e2fb7be8a45613856d824512c7d60cbd7a7f4db6ddd6280d8aed4c6379bc

python3-tkinter-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 5b800a49b01cfbdd50440a15088336f36837a3d3836fc97ffdf3f6467dfd80dc

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

x86_64

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 2beeff5bf70cda5abfa8ba8ccbbb727498ab12d0cb1dbaff99d61f48e8a04621

python3-devel-3.9.10-3.el9_0.i686.rpm

SHA-256: 17a9c153cbd0c8741bde5f38725a4cde4399e39496345c52f6072b0a60f2b8a9

python3-devel-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 9d0471e544f1fc648a209bae1347286c38a1ec1388fc9cbd8b6d1ab63659e150

python3-libs-3.9.10-3.el9_0.i686.rpm

SHA-256: 37a6d47cb354f1258279f0116d6719e8ac2ac5ce5ee92d9b741ba1bc6c8d86cf

python3-libs-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 0f32e2fb7be8a45613856d824512c7d60cbd7a7f4db6ddd6280d8aed4c6379bc

python3-tkinter-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 5b800a49b01cfbdd50440a15088336f36837a3d3836fc97ffdf3f6467dfd80dc

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

Red Hat Enterprise Linux for IBM z Systems 9

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

s390x

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.s390x.rpm

SHA-256: 611dcb64fcd1a97ef539e0cd1981767adaf3c0e26b619e75523939155f7854ed

python3-devel-3.9.10-3.el9_0.s390x.rpm

SHA-256: 604f87d47bfd8da719c01e9a7d274e353350b0ffe215dbf99b1f25c5d72c22c4

python3-libs-3.9.10-3.el9_0.s390x.rpm

SHA-256: 2cfa14d27c6120dd42b8a4adc5c6ad4872903e38ce12e394b2d368b1eaafc65c

python3-tkinter-3.9.10-3.el9_0.s390x.rpm

SHA-256: 316e09ead5196cb6403b8f316d4ef9d0335aa2fe769ade34da1fcbaa822b0aab

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

s390x

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.s390x.rpm

SHA-256: 611dcb64fcd1a97ef539e0cd1981767adaf3c0e26b619e75523939155f7854ed

python3-devel-3.9.10-3.el9_0.s390x.rpm

SHA-256: 604f87d47bfd8da719c01e9a7d274e353350b0ffe215dbf99b1f25c5d72c22c4

python3-libs-3.9.10-3.el9_0.s390x.rpm

SHA-256: 2cfa14d27c6120dd42b8a4adc5c6ad4872903e38ce12e394b2d368b1eaafc65c

python3-tkinter-3.9.10-3.el9_0.s390x.rpm

SHA-256: 316e09ead5196cb6403b8f316d4ef9d0335aa2fe769ade34da1fcbaa822b0aab

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

Red Hat Enterprise Linux for Power, little endian 9

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

ppc64le

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 38500f390ea5eeeee7a654a4f5c8a578afcfa4bb4d1b7d1fb778f76499014916

python3-devel-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: bc1836950c05c2ecf44903d19a0773e4543063b8bedb0a40372e15c6af5613f0

python3-libs-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 4b9504bf3684c8663017fe0f06beee62bdafc5c7b8e3f0bb718c604b42e06b88

python3-tkinter-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: fac0ef4227272d0693b20a3dae2bd36bc1ca22bdeeffa86747bcba13b5fc9187

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

ppc64le

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 38500f390ea5eeeee7a654a4f5c8a578afcfa4bb4d1b7d1fb778f76499014916

python3-devel-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: bc1836950c05c2ecf44903d19a0773e4543063b8bedb0a40372e15c6af5613f0

python3-libs-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 4b9504bf3684c8663017fe0f06beee62bdafc5c7b8e3f0bb718c604b42e06b88

python3-tkinter-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: fac0ef4227272d0693b20a3dae2bd36bc1ca22bdeeffa86747bcba13b5fc9187

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

Red Hat Enterprise Linux for ARM 64 9

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

aarch64

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 539a0e77a645c63db5c35b41a92fbb474e2e6d158e050c3e8bac54d6bf013dc6

python3-devel-3.9.10-3.el9_0.aarch64.rpm

SHA-256: ae62a67f508263f33eafe64b9b337d5911af780099c02b00161101377233ab89

python3-libs-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 68bd99aab5d6b83c6e53760d70e13ed3a5309ed358ed8b85ecbf07c800159598

python3-tkinter-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 02636f3d8e755376ab2c0cf69eab577d194c40b1cfafcbec66d3d592136a9a76

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

ppc64le

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 38500f390ea5eeeee7a654a4f5c8a578afcfa4bb4d1b7d1fb778f76499014916

python3-devel-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: bc1836950c05c2ecf44903d19a0773e4543063b8bedb0a40372e15c6af5613f0

python3-libs-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 4b9504bf3684c8663017fe0f06beee62bdafc5c7b8e3f0bb718c604b42e06b88

python3-tkinter-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: fac0ef4227272d0693b20a3dae2bd36bc1ca22bdeeffa86747bcba13b5fc9187

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

x86_64

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 2beeff5bf70cda5abfa8ba8ccbbb727498ab12d0cb1dbaff99d61f48e8a04621

python3-devel-3.9.10-3.el9_0.i686.rpm

SHA-256: 17a9c153cbd0c8741bde5f38725a4cde4399e39496345c52f6072b0a60f2b8a9

python3-devel-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 9d0471e544f1fc648a209bae1347286c38a1ec1388fc9cbd8b6d1ab63659e150

python3-libs-3.9.10-3.el9_0.i686.rpm

SHA-256: 37a6d47cb354f1258279f0116d6719e8ac2ac5ce5ee92d9b741ba1bc6c8d86cf

python3-libs-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 0f32e2fb7be8a45613856d824512c7d60cbd7a7f4db6ddd6280d8aed4c6379bc

python3-tkinter-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 5b800a49b01cfbdd50440a15088336f36837a3d3836fc97ffdf3f6467dfd80dc

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

Red Hat CodeReady Linux Builder for x86_64 9

SRPM

x86_64

python3-3.9.10-3.el9_0.i686.rpm

SHA-256: faade38d577e17c436f296bba3deb65a47429253f22c651606596b8ead067667

python3-debug-3.9.10-3.el9_0.i686.rpm

SHA-256: e47294be0bb346b81fb121068826a9249d6204652bee4508212e525b4c1c7bde

python3-debug-3.9.10-3.el9_0.x86_64.rpm

SHA-256: b8e29e752feec5f435a68ab9a69230a57d572f564689a1c1dae2fccedb54de29

python3-idle-3.9.10-3.el9_0.i686.rpm

SHA-256: f13c7d3867ba1635fafcc8d0c98374fee4b75d4e7c45b926190ec9cb38e528a0

python3-idle-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 974bbdff86b22aa7ab7eff49cdf0a1320788a4b863795f47d9288df993a73980

python3-test-3.9.10-3.el9_0.i686.rpm

SHA-256: 83e78a93e94081214034f8fc3d5acfe227931264304be9014b22165710ed1486

python3-test-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 0c0e6e2286609d5fce2b5632de6b075f86221177907ed325886c95e9f057c4da

python3-tkinter-3.9.10-3.el9_0.i686.rpm

SHA-256: 488c6d7b2372addfab7891e876db8e5a15e36f7d517588540b494b9062b7ad6f

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

Red Hat CodeReady Linux Builder for Power, little endian 9

SRPM

ppc64le

python3-debug-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: a0c5a5626cffd028c18d7e59e484639b9b30b00eabe5061b8bc0eac749e26122

python3-idle-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: a3f27805c22501da7f0eed2f2260ec42163e852a85b944bd65a39027b21efdea

python3-test-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: fda3a53bf513bc00388c73d873e08427e95a6792b3e2d1ea378798a09a5a4805

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

Red Hat CodeReady Linux Builder for ARM 64 9

SRPM

aarch64

python3-debug-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 33ca8426b37103077d824649322c958d8d5fa199fe6b4a63f60b24cd52ad36fc

python3-idle-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 0de559219a472a776100d0cfa1df35c00079f118d30c8b2718e390ed33d4960d

python3-test-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 5c8aca0e8f9804e42a75d212e1ccfe67d148bbe94350ebd20544b585f95b00d4

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

Red Hat CodeReady Linux Builder for IBM z Systems 9

SRPM

s390x

python3-debug-3.9.10-3.el9_0.s390x.rpm

SHA-256: 652764d94c03ff70663a05efe5b3a3e12a36c30a83355b31c1de8ed7573a7ad3

python3-idle-3.9.10-3.el9_0.s390x.rpm

SHA-256: 672d9b519503aca5b377a04324e1b6f4a46ca28f0af721140f6327a1d679703c

python3-test-3.9.10-3.el9_0.s390x.rpm

SHA-256: 4ec2ff1a9f81981072e066b2067f50b78b892cc35c0d3438009c647c44b874d7

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

aarch64

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 539a0e77a645c63db5c35b41a92fbb474e2e6d158e050c3e8bac54d6bf013dc6

python3-devel-3.9.10-3.el9_0.aarch64.rpm

SHA-256: ae62a67f508263f33eafe64b9b337d5911af780099c02b00161101377233ab89

python3-libs-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 68bd99aab5d6b83c6e53760d70e13ed3a5309ed358ed8b85ecbf07c800159598

python3-tkinter-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 02636f3d8e755376ab2c0cf69eab577d194c40b1cfafcbec66d3d592136a9a76

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0

SRPM

x86_64

python3-3.9.10-3.el9_0.i686.rpm

SHA-256: faade38d577e17c436f296bba3deb65a47429253f22c651606596b8ead067667

python3-debug-3.9.10-3.el9_0.i686.rpm

SHA-256: e47294be0bb346b81fb121068826a9249d6204652bee4508212e525b4c1c7bde

python3-debug-3.9.10-3.el9_0.x86_64.rpm

SHA-256: b8e29e752feec5f435a68ab9a69230a57d572f564689a1c1dae2fccedb54de29

python3-idle-3.9.10-3.el9_0.i686.rpm

SHA-256: f13c7d3867ba1635fafcc8d0c98374fee4b75d4e7c45b926190ec9cb38e528a0

python3-idle-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 974bbdff86b22aa7ab7eff49cdf0a1320788a4b863795f47d9288df993a73980

python3-test-3.9.10-3.el9_0.i686.rpm

SHA-256: 83e78a93e94081214034f8fc3d5acfe227931264304be9014b22165710ed1486

python3-test-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 0c0e6e2286609d5fce2b5632de6b075f86221177907ed325886c95e9f057c4da

python3-tkinter-3.9.10-3.el9_0.i686.rpm

SHA-256: 488c6d7b2372addfab7891e876db8e5a15e36f7d517588540b494b9062b7ad6f

python3.9-debuginfo-3.9.10-3.el9_0.i686.rpm

SHA-256: f03471812f003c7bb9d829e5cd0310c24581e3fc5491b416b6c3d196959db126

python3.9-debuginfo-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 3656a3a40b5179d38d15d48d5d219bef16fec71a3f0cfae95c484805cbc74328

python3.9-debugsource-3.9.10-3.el9_0.i686.rpm

SHA-256: 2df0a52b04f4afa6294d6f7dd864f222d193a90749eecde45244d8e36f8b7972

python3.9-debugsource-3.9.10-3.el9_0.x86_64.rpm

SHA-256: 83435a7cadc708f16e8976472897998ac692016c5b6993d884c450bb8b321e96

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0

SRPM

ppc64le

python3-debug-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: a0c5a5626cffd028c18d7e59e484639b9b30b00eabe5061b8bc0eac749e26122

python3-idle-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: a3f27805c22501da7f0eed2f2260ec42163e852a85b944bd65a39027b21efdea

python3-test-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: fda3a53bf513bc00388c73d873e08427e95a6792b3e2d1ea378798a09a5a4805

python3.9-debuginfo-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 8c40d21fbb1875e9de1ca49a28fc85f6b8c7c3ba2c85752a1cb8aa39e6ca44e3

python3.9-debugsource-3.9.10-3.el9_0.ppc64le.rpm

SHA-256: 9805c6cf5494111a466f54eb4ed90ed00da0209720888ea5e06deed170d7f1e7

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 9.0

SRPM

s390x

python3-debug-3.9.10-3.el9_0.s390x.rpm

SHA-256: 652764d94c03ff70663a05efe5b3a3e12a36c30a83355b31c1de8ed7573a7ad3

python3-idle-3.9.10-3.el9_0.s390x.rpm

SHA-256: 672d9b519503aca5b377a04324e1b6f4a46ca28f0af721140f6327a1d679703c

python3-test-3.9.10-3.el9_0.s390x.rpm

SHA-256: 4ec2ff1a9f81981072e066b2067f50b78b892cc35c0d3438009c647c44b874d7

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0

SRPM

aarch64

python3-debug-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 33ca8426b37103077d824649322c958d8d5fa199fe6b4a63f60b24cd52ad36fc

python3-idle-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 0de559219a472a776100d0cfa1df35c00079f118d30c8b2718e390ed33d4960d

python3-test-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 5c8aca0e8f9804e42a75d212e1ccfe67d148bbe94350ebd20544b585f95b00d4

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

aarch64

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 539a0e77a645c63db5c35b41a92fbb474e2e6d158e050c3e8bac54d6bf013dc6

python3-devel-3.9.10-3.el9_0.aarch64.rpm

SHA-256: ae62a67f508263f33eafe64b9b337d5911af780099c02b00161101377233ab89

python3-libs-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 68bd99aab5d6b83c6e53760d70e13ed3a5309ed358ed8b85ecbf07c800159598

python3-tkinter-3.9.10-3.el9_0.aarch64.rpm

SHA-256: 02636f3d8e755376ab2c0cf69eab577d194c40b1cfafcbec66d3d592136a9a76

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debuginfo-3.9.10-3.el9_0.aarch64.rpm

SHA-256: af7d4038e374696072c89a5841a4d9b68185f1c14171384274efd13c9d461543

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

python3.9-debugsource-3.9.10-3.el9_0.aarch64.rpm

SHA-256: d2f7a169190fba6d446f2f12732e2216cdec483b8aad603632f5c716bcddcf84

Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0

SRPM

python3.9-3.9.10-3.el9_0.src.rpm

SHA-256: 02e800a49f9990b41473819d5b4d48c71d2ba4285c07432d5db24688a459d987

s390x

python-unversioned-command-3.9.10-3.el9_0.noarch.rpm

SHA-256: ec35d9593ef3c0183e572c94e1f6ec7acd91c99f0524727d4274ba746a586f55

python3-3.9.10-3.el9_0.s390x.rpm

SHA-256: 611dcb64fcd1a97ef539e0cd1981767adaf3c0e26b619e75523939155f7854ed

python3-devel-3.9.10-3.el9_0.s390x.rpm

SHA-256: 604f87d47bfd8da719c01e9a7d274e353350b0ffe215dbf99b1f25c5d72c22c4

python3-libs-3.9.10-3.el9_0.s390x.rpm

SHA-256: 2cfa14d27c6120dd42b8a4adc5c6ad4872903e38ce12e394b2d368b1eaafc65c

python3-tkinter-3.9.10-3.el9_0.s390x.rpm

SHA-256: 316e09ead5196cb6403b8f316d4ef9d0335aa2fe769ade34da1fcbaa822b0aab

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debuginfo-3.9.10-3.el9_0.s390x.rpm

SHA-256: ae6ef8136c342ccee89a1835fde043bb4963f34874acab63eb626a03e9c4890b

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

python3.9-debugsource-3.9.10-3.el9_0.s390x.rpm

SHA-256: 7fb050369c11b00849080514a39b6eac4ebc09b14f9a8ec54248507088599035

Related news

CVE-2022-36777: Security Bulletin: QRadar Suite Software includes components with multiple known vulnerabilities

IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.16.0could allow an authenticated user to obtain sensitive version information that could aid in further attacks against the system. IBM X-Force ID: 233665.

CVE-2023-22062: Oracle Critical Patch Update Advisory - July 2023

Vulnerability in the Oracle Hyperion Financial Reporting product of Oracle Hyperion (component: Repository). The supported version that is affected is 11.2.13.0.000. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hyperion Financial Reporting accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Hyperion Financial Reporting. CVSS 3.1 Base Score 8.5 (Confidentiality and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L).

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

CVE-2023-23694: DSA-2023-071: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities – 7.0.450

Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.

RHSA-2023:2763: Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update

An update for the python38:3.8 and python38-devel:3.8 modules is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-10735: A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not a...

RHSA-2023:2104: Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.5.8 security updates and bug fixes

Red Hat Advanced Cluster Management for Kubernetes 2.5.8 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.

RHSA-2023:2061: Red Hat Security Advisory: Multicluster Engine for Kubernetes 2.1.6 security updates and bug fixes

Multicluster Engine for Kubernetes 2.1.6 General Availability release images, which fix bugs and security updates container images. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-25881: A flaw was found in http-cache-semantics. When the server reads the cache policy from the request using this library, a Regular Expression Denial of Service occurs, caused by malicious request header values sent to the server.

RHSA-2023:2023: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.11.7 Bug Fix and security update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.11.7 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-40186: A flaw was found in HashiCorp Vault and Vault Enterprise, where they could allow a locally authenticated attacker to gain unauthorized access to the system, caused by a flaw in the alias naming schema implementation for mount accessors with shared alias n...

Red Hat Security Advisory 2023-1816-01

Red Hat Security Advisory 2023-1816-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

CVE-2023-21954: Oracle Critical Patch Update Advisory - April 2023

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through...

RHSA-2023:1816: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.2 Bug Fix and security update

Updated images that fix several bugs are now available for Red Hat OpenShift Data Foundation 4.12.2 on Red Hat Enterprise Linux 8 from Red Hat Container Registry. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While ...

Red Hat Security Advisory 2023-1448-01

Red Hat Security Advisory 2023-1448-01 - Red Hat OpenShift Service Mesh is the Red Hat distribution of the Istio service mesh project, tailored for installation into an on-premise OpenShift Container Platform installation. This advisory covers container images for the release.

Red Hat Security Advisory 2023-1454-01

Red Hat Security Advisory 2023-1454-01 - An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Moderate.

RHSA-2023:1454: Red Hat Security Advisory: Red Hat OpenShift GitOps security update

An update is now available for Red Hat OpenShift GitOps 1.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41354: An information disclosure flaw was found in Argo CD. This issue may allow unauthorized users to enumerate application names by inspecting API error messages and could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant ...

RHSA-2023:1453: Red Hat Security Advisory: Red Hat OpenShift GitOps security update

An update is now available for Red Hat OpenShift GitOps 1.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41354: An information disclosure flaw was found in Argo CD. This issue may allow unauthorized users to enumerate application names by inspecting API error messages and could use the discovered application names as the starting point of another attack. For example, the attacker might use their knowledge of an application name to convince an administrator to grant ...

RHSA-2023:1428: Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.8 security and bug fix update

The Migration Toolkit for Containers (MTC) 1.7.8 is now available. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2022-24999: A flaw was found in the express.js npm package. Express.js Express is vulnerable to a d...

Red Hat Security Advisory 2023-0931-01

Red Hat Security Advisory 2023-0931-01 - Update information for Logging Subsystem 5.4.12 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-0932-01

Red Hat Security Advisory 2023-0932-01 - Update information for Logging Subsystem 5.6.3 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.

Red Hat Security Advisory 2023-1170-01

Red Hat Security Advisory 2023-1170-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

Red Hat Security Advisory 2023-0930-01

Red Hat Security Advisory 2023-0930-01 - Update information for Logging Subsystem 5.5.8 in Red Hat OpenShift. Red Hat Product Security has rated this update as having a security impact of Moderate.

RHSA-2023:0931: Red Hat Security Advisory: Logging Subsystem 5.4.12 - Red Hat OpenShift

Logging Subsystem 5.4.12 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to alloc...

RHSA-2023:0930: Red Hat Security Advisory: Logging Subsystem 5.5.8 - Red Hat OpenShift

Logging Subsystem 5.5.8 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&...

RHSA-2023:1170: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.1 security bug fix update

Red Hat OpenShift Data Foundation 4.12.1 Bug Fix Update Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-4238: A flaw was found in goutils where randomly generated alphanumeric strings contain significantly less entropy than expected. Both the `RandomAlphaNumeric` and `CryptoRandomAlphaNumeric` functions always return strings containing at least one digit from 0 to 9. This issue significantly reduces the amount of entropy generated in short strings by these functions.

RHSA-2023:0932: Red Hat Security Advisory: Logging Subsystem 5.6.3 - Red Hat OpenShift

Logging Subsystem 5.6.3 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24999: qs before 6.10.3, as used in Express before 4.17.3 and other products, allows attackers to cause a Node process hang for an Express application because an __ proto__ key can be used. In many typical Express use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as a[__proto__]=b&...

CVE-2023-25536: DSA-2023-035: Dell PowerScale OneFS Security Updates for Multiple Security Vulnerabilities

Dell PowerScale OneFS 9.4.0.x contains exposure of sensitive information to an unauthorized actor. A malicious authenticated local user could potentially exploit this vulnerability in certificate management, leading to a potential system takeover.

Red Hat Security Advisory 2023-0833-01

Red Hat Security Advisory 2023-0833-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include denial of service, information leakage, and open redirection vulnerabilities.

RHSA-2023:0833: Red Hat Security Advisory: python3 security update

An update for python3 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-10735: A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this v...

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

CVE-2023-0036: en/security-disclosure/2023/2023-01.md · OpenHarmony/security - Gitee.com

platform_callback_stub in misc subsystem within OpenHarmony-v3.0.5 and prior versions has an authentication bypass vulnerability which allows an "SA relay attack".Local attackers can bypass authentication and attack other SAs with high privilege.

Red Hat Security Advisory 2022-7323-01

Red Hat Security Advisory 2022-7323-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a denial of service vulnerability.

Red Hat Security Advisory 2022-6766-01

Red Hat Security Advisory 2022-6766-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include denial of service, information leakage, and open redirection vulnerabilities.

RHSA-2022:6766: Red Hat Security Advisory: rh-python38-python security update

An update for rh-python38-python is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2015-20107: python(mailcap): findmatch() function does not sanitise the second argument * CVE-2020-10735: python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS * CVE-2021-28861: python: an open redirection vulnerability in lib/http/server.py may lead to information disclosure

CVE-2020-10735: Red Hat Customer Portal - Access to 24x7 support and knowledge

A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int("text"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.