Headline
RHSA-2023:3796: Red Hat Security Advisory: python3 security update
An update for python3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Synopsis
Important: python3 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for python3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
- python: urllib.parse url blocklisting bypass (CVE-2023-24329)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2173917 - CVE-2023-24329 python: urllib.parse url blocklisting bypass
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
x86_64
platform-python-3.6.8-47.el8_6.1.i686.rpm
SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b
platform-python-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636
platform-python-debug-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126
platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230
platform-python-devel-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641
platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-idle-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2
python3-idle-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30
python3-libs-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356
python3-libs-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec
python3-test-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef
python3-test-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a
python3-tkinter-3.6.8-47.el8_6.1.i686.rpm
SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062
python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
x86_64
platform-python-3.6.8-47.el8_6.1.i686.rpm
SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b
platform-python-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636
platform-python-debug-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126
platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230
platform-python-devel-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641
platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-idle-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2
python3-idle-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30
python3-libs-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356
python3-libs-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec
python3-test-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef
python3-test-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a
python3-tkinter-3.6.8-47.el8_6.1.i686.rpm
SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062
python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
s390x
platform-python-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: 609684d2ccee728e3b0f55ee6166b27eb61884e89639e01f9e0ce2f4da2939eb
platform-python-debug-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: 6f51a75fda4b1ef9533d566d46904c9fc6b798a7acdc8e48119c5368d2196e91
platform-python-devel-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: ed59ec94004589609cccb60fa02d3b13bb7269af1953334425dd826082d00cad
python3-debuginfo-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: 75589d5d69d5a4b914b0125ab7ac17b8ad5caacb3b359017fc6ee6dc5f9dcc7b
python3-debuginfo-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: 75589d5d69d5a4b914b0125ab7ac17b8ad5caacb3b359017fc6ee6dc5f9dcc7b
python3-debugsource-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: bca5a72aa1c63946e9158e736dac7f5dd06f11c69ab8accd59e9405136b681ec
python3-debugsource-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: bca5a72aa1c63946e9158e736dac7f5dd06f11c69ab8accd59e9405136b681ec
python3-idle-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: a409a4aa20386497cdcf2af4343728baac9433b026a2d15e58e422a1357e2313
python3-libs-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: 9855347be96a868674bae1966ec6032e3fd6456b16c078d6d1ae5e5e20f8ab8d
python3-test-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: 821c805237c6ebe7d6821260f4545a0352d7b6843fcedc4755d548928d63d03a
python3-tkinter-3.6.8-47.el8_6.1.s390x.rpm
SHA-256: 0ca6c3d0ce44f81865ba00be189312cd8c2783238f02ee7b2474e13b60a7c10c
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
ppc64le
platform-python-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 5ae0a0a5b8a6a9de2e18b4c4ad4a97d27bd57a7e667c29dd36e369ba6e65771b
platform-python-debug-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 24e700f908d189eadbdf524fd2b46ab5390d2ff0f3659688fcf304874393f0ae
platform-python-devel-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 505a8628744c4f37c1b0d18cb74273e3134701c52053fb5765e01fdc6caeeeb5
python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c
python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c
python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4
python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4
python3-idle-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 15d900855fec3da0dc0d3fa7270dd4fb01dcb29354caf3f72325b8db1b51a85f
python3-libs-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 71a2fb2a4078c4b65c2984a1a99226cea2a1729463ea12dd0c97d55d0f8b8866
python3-test-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 1a1f3b56de0b43ea9f8708d30ee41a083dbb6f24c6cf1eb09cb2d04ca072dad7
python3-tkinter-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 70b93343f35df30356d4920b4e8d9e004bd969e6d88dfc8a782314b97539338a
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
x86_64
platform-python-3.6.8-47.el8_6.1.i686.rpm
SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b
platform-python-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636
platform-python-debug-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126
platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230
platform-python-devel-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641
platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-idle-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2
python3-idle-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30
python3-libs-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356
python3-libs-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec
python3-test-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef
python3-test-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a
python3-tkinter-3.6.8-47.el8_6.1.i686.rpm
SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062
python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
aarch64
platform-python-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 1958a6284d45859124fce33c5599755cf2fb6d8daff09c326bd4272fb4b0a69e
platform-python-debug-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 09936fec413e6fd4a8a1456048915ecb2f5918f0b33aa233c205f02ba64e0119
platform-python-devel-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 62653cf0094cdd755fe4ec7bd62c9186961e413ae8df8151b889dee28cfdc595
python3-debuginfo-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: f95373f5e1458033c8ff62ec69e67ffae8ed66f77c9fb52d0c5ae1035487ad12
python3-debuginfo-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: f95373f5e1458033c8ff62ec69e67ffae8ed66f77c9fb52d0c5ae1035487ad12
python3-debugsource-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 1c60c60b50186bcbc5693cbb309f4b49015b6ca97b2b31c0d8074002c64a4d9a
python3-debugsource-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 1c60c60b50186bcbc5693cbb309f4b49015b6ca97b2b31c0d8074002c64a4d9a
python3-idle-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 4e6062a465430877f93ee05e961a666266c7065f2521c3320708b3a52c052063
python3-libs-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: d7bace4823eb903e73e9b5be08f9b5f2616a760ab915705472023b088ad0cac3
python3-test-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 920c70a718d7a37a3a48c110d2ab67908b8ed4008485cc16675bf89d9df3741d
python3-tkinter-3.6.8-47.el8_6.1.aarch64.rpm
SHA-256: 9d52b25f2bbc2089005a9c20519fd40e455977325190df4fda5ecb00e5fd595b
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
ppc64le
platform-python-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 5ae0a0a5b8a6a9de2e18b4c4ad4a97d27bd57a7e667c29dd36e369ba6e65771b
platform-python-debug-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 24e700f908d189eadbdf524fd2b46ab5390d2ff0f3659688fcf304874393f0ae
platform-python-devel-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 505a8628744c4f37c1b0d18cb74273e3134701c52053fb5765e01fdc6caeeeb5
python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c
python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c
python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4
python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4
python3-idle-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 15d900855fec3da0dc0d3fa7270dd4fb01dcb29354caf3f72325b8db1b51a85f
python3-libs-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 71a2fb2a4078c4b65c2984a1a99226cea2a1729463ea12dd0c97d55d0f8b8866
python3-test-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 1a1f3b56de0b43ea9f8708d30ee41a083dbb6f24c6cf1eb09cb2d04ca072dad7
python3-tkinter-3.6.8-47.el8_6.1.ppc64le.rpm
SHA-256: 70b93343f35df30356d4920b4e8d9e004bd969e6d88dfc8a782314b97539338a
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
python3-3.6.8-47.el8_6.1.src.rpm
SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3
x86_64
platform-python-3.6.8-47.el8_6.1.i686.rpm
SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b
platform-python-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636
platform-python-debug-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126
platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230
platform-python-devel-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641
platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.i686.rpm
SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3
python3-idle-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2
python3-idle-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30
python3-libs-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356
python3-libs-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec
python3-test-3.6.8-47.el8_6.1.i686.rpm
SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef
python3-test-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a
python3-tkinter-3.6.8-47.el8_6.1.i686.rpm
SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062
python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm
SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693
Related news
Red Hat Security Advisory 2023-4980-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.7 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-4875-01 - Red Hat Advanced Cluster Management for Kubernetes 2.8.1 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide security updates and fix several bugs. Issues addressed include bypass and privilege escalation vulnerabilities.
Red Hat Security Advisory 2023-4421-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.5 images.
Red Hat Security Advisory 2023-4290-01 - OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.
An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Red Hat Security Advisory 2023-4241-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.
Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...
Red Hat Security Advisory 2023-4204-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. After deploying the VolSync operator, it can create and maintain copies of your persistent data.
An update for python3.9 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Red Hat OpenShift Service Mesh 2.2.8 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modu...
Red Hat Security Advisory 2023-4032-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.
Red Hat Security Advisory 2023-3932-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.
Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability. * CVE...
An update for python3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blan...
A new image is available for Red Hat Single Sign-On 7.6.4, running on OpenShift Container Platform 3.10 and 3.11, and 4.12.0. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4361: Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri. * CVE-2023...
Red Hat Security Advisory 2023-3614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4.
Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.
Red Hat Security Advisory 2023-3777-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.
Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...
Release of Bug Advisories for the OpenShift Jenkins image and Jenkins agent base image. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where reques...
Red Hat Security Advisory 2023-3556-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
An update for python3 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Red Hat Security Advisory 2023-3550-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.
An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.