Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:3796: Red Hat Security Advisory: python3 security update

An update for python3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.
Red Hat Security Data
#vulnerability#linux#red_hat#ibm#sap

Synopsis

Important: python3 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for python3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.

Security Fix(es):

  • python: urllib.parse url blocklisting bypass (CVE-2023-24329)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.6 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64

Fixes

  • BZ - 2173917 - CVE-2023-24329 python: urllib.parse url blocklisting bypass

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

x86_64

platform-python-3.6.8-47.el8_6.1.i686.rpm

SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b

platform-python-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636

platform-python-debug-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126

platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230

platform-python-devel-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641

platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-idle-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2

python3-idle-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30

python3-libs-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356

python3-libs-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec

python3-test-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef

python3-test-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a

python3-tkinter-3.6.8-47.el8_6.1.i686.rpm

SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062

python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693

Red Hat Enterprise Linux Server - AUS 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

x86_64

platform-python-3.6.8-47.el8_6.1.i686.rpm

SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b

platform-python-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636

platform-python-debug-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126

platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230

platform-python-devel-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641

platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-idle-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2

python3-idle-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30

python3-libs-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356

python3-libs-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec

python3-test-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef

python3-test-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a

python3-tkinter-3.6.8-47.el8_6.1.i686.rpm

SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062

python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

s390x

platform-python-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: 609684d2ccee728e3b0f55ee6166b27eb61884e89639e01f9e0ce2f4da2939eb

platform-python-debug-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: 6f51a75fda4b1ef9533d566d46904c9fc6b798a7acdc8e48119c5368d2196e91

platform-python-devel-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: ed59ec94004589609cccb60fa02d3b13bb7269af1953334425dd826082d00cad

python3-debuginfo-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: 75589d5d69d5a4b914b0125ab7ac17b8ad5caacb3b359017fc6ee6dc5f9dcc7b

python3-debuginfo-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: 75589d5d69d5a4b914b0125ab7ac17b8ad5caacb3b359017fc6ee6dc5f9dcc7b

python3-debugsource-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: bca5a72aa1c63946e9158e736dac7f5dd06f11c69ab8accd59e9405136b681ec

python3-debugsource-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: bca5a72aa1c63946e9158e736dac7f5dd06f11c69ab8accd59e9405136b681ec

python3-idle-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: a409a4aa20386497cdcf2af4343728baac9433b026a2d15e58e422a1357e2313

python3-libs-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: 9855347be96a868674bae1966ec6032e3fd6456b16c078d6d1ae5e5e20f8ab8d

python3-test-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: 821c805237c6ebe7d6821260f4545a0352d7b6843fcedc4755d548928d63d03a

python3-tkinter-3.6.8-47.el8_6.1.s390x.rpm

SHA-256: 0ca6c3d0ce44f81865ba00be189312cd8c2783238f02ee7b2474e13b60a7c10c

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

ppc64le

platform-python-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 5ae0a0a5b8a6a9de2e18b4c4ad4a97d27bd57a7e667c29dd36e369ba6e65771b

platform-python-debug-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 24e700f908d189eadbdf524fd2b46ab5390d2ff0f3659688fcf304874393f0ae

platform-python-devel-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 505a8628744c4f37c1b0d18cb74273e3134701c52053fb5765e01fdc6caeeeb5

python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c

python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c

python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4

python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4

python3-idle-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 15d900855fec3da0dc0d3fa7270dd4fb01dcb29354caf3f72325b8db1b51a85f

python3-libs-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 71a2fb2a4078c4b65c2984a1a99226cea2a1729463ea12dd0c97d55d0f8b8866

python3-test-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 1a1f3b56de0b43ea9f8708d30ee41a083dbb6f24c6cf1eb09cb2d04ca072dad7

python3-tkinter-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 70b93343f35df30356d4920b4e8d9e004bd969e6d88dfc8a782314b97539338a

Red Hat Enterprise Linux Server - TUS 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

x86_64

platform-python-3.6.8-47.el8_6.1.i686.rpm

SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b

platform-python-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636

platform-python-debug-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126

platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230

platform-python-devel-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641

platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-idle-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2

python3-idle-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30

python3-libs-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356

python3-libs-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec

python3-test-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef

python3-test-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a

python3-tkinter-3.6.8-47.el8_6.1.i686.rpm

SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062

python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

aarch64

platform-python-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 1958a6284d45859124fce33c5599755cf2fb6d8daff09c326bd4272fb4b0a69e

platform-python-debug-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 09936fec413e6fd4a8a1456048915ecb2f5918f0b33aa233c205f02ba64e0119

platform-python-devel-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 62653cf0094cdd755fe4ec7bd62c9186961e413ae8df8151b889dee28cfdc595

python3-debuginfo-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: f95373f5e1458033c8ff62ec69e67ffae8ed66f77c9fb52d0c5ae1035487ad12

python3-debuginfo-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: f95373f5e1458033c8ff62ec69e67ffae8ed66f77c9fb52d0c5ae1035487ad12

python3-debugsource-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 1c60c60b50186bcbc5693cbb309f4b49015b6ca97b2b31c0d8074002c64a4d9a

python3-debugsource-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 1c60c60b50186bcbc5693cbb309f4b49015b6ca97b2b31c0d8074002c64a4d9a

python3-idle-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 4e6062a465430877f93ee05e961a666266c7065f2521c3320708b3a52c052063

python3-libs-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: d7bace4823eb903e73e9b5be08f9b5f2616a760ab915705472023b088ad0cac3

python3-test-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 920c70a718d7a37a3a48c110d2ab67908b8ed4008485cc16675bf89d9df3741d

python3-tkinter-3.6.8-47.el8_6.1.aarch64.rpm

SHA-256: 9d52b25f2bbc2089005a9c20519fd40e455977325190df4fda5ecb00e5fd595b

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

ppc64le

platform-python-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 5ae0a0a5b8a6a9de2e18b4c4ad4a97d27bd57a7e667c29dd36e369ba6e65771b

platform-python-debug-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 24e700f908d189eadbdf524fd2b46ab5390d2ff0f3659688fcf304874393f0ae

platform-python-devel-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 505a8628744c4f37c1b0d18cb74273e3134701c52053fb5765e01fdc6caeeeb5

python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c

python3-debuginfo-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: d866a7eb7bd66c52c72b4bcd53b73436964782c0b755f7f5bbce97ec61e7b37c

python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4

python3-debugsource-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: e6fd4f8a677f79326f915557df20373ed7ad85695368706d34f2acc171c948c4

python3-idle-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 15d900855fec3da0dc0d3fa7270dd4fb01dcb29354caf3f72325b8db1b51a85f

python3-libs-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 71a2fb2a4078c4b65c2984a1a99226cea2a1729463ea12dd0c97d55d0f8b8866

python3-test-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 1a1f3b56de0b43ea9f8708d30ee41a083dbb6f24c6cf1eb09cb2d04ca072dad7

python3-tkinter-3.6.8-47.el8_6.1.ppc64le.rpm

SHA-256: 70b93343f35df30356d4920b4e8d9e004bd969e6d88dfc8a782314b97539338a

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6

SRPM

python3-3.6.8-47.el8_6.1.src.rpm

SHA-256: daf55fe4de8f584c988732f2463a25b03211833efbbc590d1f5e366df77e60c3

x86_64

platform-python-3.6.8-47.el8_6.1.i686.rpm

SHA-256: f919dc6590238e703bb366908ae79f4bf2ce55775f547daa66b7512c4d09044b

platform-python-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 2ac7b4af08b5a3aa14dcd307f505fa4d9604bc96aef8839a33760d0473d63636

platform-python-debug-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 78163236335c074733228161b769d3c189335708977c170701e6c3ced8544126

platform-python-debug-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 06e987fb9019252786ba52a1ae60b3079b5c8d5c18315c66cde240a4327d4230

platform-python-devel-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7a0bf8d69ff45dfcec0b83685d7be5b68a3a4f8cfb22932e4886ceaaccbaf641

platform-python-devel-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 85e5055ffc962da3e82e3e250e38420b44832c5f24a1b598a206d235cbc56657

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 0f04d9b861a9e1dad425f7f693e80d5c5ef5aa92a179016121e56c170dd3d4e0

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debuginfo-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: a6b62bad2637fd4a7913cd105abecaca350be35cdd514b87576cc52f77acfea9

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.i686.rpm

SHA-256: df8549690d49fcbe1aae1273208eb868417ab83b978a8a05a0d4f17f00c4a02d

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-debugsource-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: dd240429ddd43198b2199c0d537e478b92874e964aada3b4306990c2d3bf6de3

python3-idle-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7068fead857603831f57b115399540adfe5ca849d65b876a3606671b8c2ed9c2

python3-idle-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 63ce7f32badd0a9f4fc7c360d35edf6a20c897838bf6a4a04f9e8b8fc7806c30

python3-libs-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 327f140f4e16156f7f51a00a1a0216110fdf4e0cb8ea608f7f790a858eac8356

python3-libs-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f321841e9f96af89df47fde9528486f1dbf4c2a360405540677a61b2d5be8dec

python3-test-3.6.8-47.el8_6.1.i686.rpm

SHA-256: 7788ec3c5fa2f852bf6ad5ae45ebd3b927efed5c34cf1181d3fd9c0a1739fdef

python3-test-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: 20f7d764d40412d8ff61c4fac070330c14eea15efb11adf1ce4cd98da84c612a

python3-tkinter-3.6.8-47.el8_6.1.i686.rpm

SHA-256: ca80984e751f486a12827136a4367a970791bf7198cc39a82ca4ddc31ee65062

python3-tkinter-3.6.8-47.el8_6.1.x86_64.rpm

SHA-256: f62bc33b8833bc95821fc5e18287a2975f4b8ed466ef20d722a032a228688693

Related news

Red Hat Security Advisory 2023-4980-01

Red Hat Security Advisory 2023-4980-01 - Red Hat Advanced Cluster Management for Kubernetes 2.6.7 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-4875-01

Red Hat Security Advisory 2023-4875-01 - Red Hat Advanced Cluster Management for Kubernetes 2.8.1 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which provide security updates and fix several bugs. Issues addressed include bypass and privilege escalation vulnerabilities.

Red Hat Security Advisory 2023-4421-01

Red Hat Security Advisory 2023-4421-01 - OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform. This advisory contains OpenShift Virtualization 4.12.5 images.

Red Hat Security Advisory 2023-4290-01

Red Hat Security Advisory 2023-4290-01 - OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4290: Red Hat Security Advisory: OpenShift sandboxed containers 1.4.1 security update

OpenShift sandboxed containers 1.4.1 is now available. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modules in use were FIPS-validated.

RHSA-2023:4282: Red Hat Security Advisory: Red Hat Virtualization Host 4.4.z SP 1 security update

An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.

Red Hat Security Advisory 2023-4241-01

Red Hat Security Advisory 2023-4241-01 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Data Foundation. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform.

RHSA-2023:4090: Red Hat Security Advisory: OpenShift Container Platform 4.13.5 security update

Red Hat OpenShift Container Platform release 4.13.5 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.13. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41717: A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server c...

Red Hat Security Advisory 2023-4204-01

Red Hat Security Advisory 2023-4204-01 - VolSync is a Kubernetes operator that enables asynchronous replication of persistent volumes within a cluster, or across clusters. After deploying the VolSync operator, it can create and maintain copies of your persistent data.

RHSA-2023:4203: Red Hat Security Advisory: python3.9 security update

An update for python3.9 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.

RHSA-2023:4112: Red Hat Security Advisory: Red Hat OpenShift Service Mesh 2.2.8 security update

Red Hat OpenShift Service Mesh 2.2.8 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-41723: A flaw was found in golang. A maliciously crafted HTTP/2 stream could cause excessive CPU consumption in the HPACK decoder, sufficient to cause a denial of service from a small number of small requests. * CVE-2023-3089: A compliance problem was found in the Red Hat OpenShift Container Platform. Red Hat discovered that, when FIPS mode was enabled, not all of the cryptographic modu...

Red Hat Security Advisory 2023-4032-01

Red Hat Security Advisory 2023-4032-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

Red Hat Security Advisory 2023-3925-01

Red Hat Security Advisory 2023-3925-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.12.23.

Red Hat Security Advisory 2023-3932-01

Red Hat Security Advisory 2023-3932-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.

RHSA-2023:3943: Red Hat Security Advisory: ACS 4.1 enhancement and security update

Updated images are now available for Red Hat Advanced Cluster Security (RHACS). The updated image includes new features and bug fixes. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-27191: A broken cryptographic algorithm flaw was found in golang.org/x/crypto/ssh. This issue causes a client to fail authentication with RSA keys to servers that reject signature algorithms based on SHA-2, enabling an attacker to crash the server, resulting in a loss of availability. * CVE...

RHSA-2023:3934: Red Hat Security Advisory: python3 security update

An update for python3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blan...

RHSA-2023:3888: Red Hat Security Advisory: Red Hat Single Sign-On 7.6.4 for OpenShift image security enhancement update

A new image is available for Red Hat Single Sign-On 7.6.4, running on OpenShift Container Platform 3.10 and 3.11, and 4.12.0. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-4361: Keycloak, an open-source identity and access management solution, has a cross-site scripting (XSS) vulnerability in the SAML or OIDC providers. The vulnerability can allow an attacker to execute malicious scripts by setting the AssertionConsumerServiceURL value or the redirect_uri. * CVE-2023...

Red Hat Security Advisory 2023-3614-01

Red Hat Security Advisory 2023-3614-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.13.4.

Red Hat Security Advisory 2023-3742-02

Red Hat Security Advisory 2023-3742-02 - Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. Issues addressed include bypass, denial of service, and remote SQL injection vulnerabilities.

Red Hat Security Advisory 2023-3777-01

Red Hat Security Advisory 2023-3777-01 - Python is an interpreted, interactive, object-oriented programming language that supports modules, classes, exceptions, high-level dynamic data types, and dynamic typing. The python27 packages provide a stable release of Python 2.7 with a number of additional utilities and database connectors for MySQL and PostgreSQL. Issues addressed include a bypass vulnerability.

RHSA-2023:3742: Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.13.0 security and bug fix update

Updated images that include numerous enhancements, security, and bug fixes are now available in Red Hat Container Registry for Red Hat OpenShift Data Foundation 4.13.0 on Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-16250: A flaw was found in Vault and Vault Enterprise (“Vault”). In the affected versions of Vault, with the AWS Auth Method configured and under certain circumstances, the values relied upon by Vault to validate AWS IAM ident...

RHSA-2023:3664: Red Hat Security Advisory: OpenShift Jenkins image and Jenkins agent base image security update

Release of Bug Advisories for the OpenShift Jenkins image and Jenkins agent base image. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1705: A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating "chunked" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid. * CVE-2022-2880: A flaw was found in the golang package, where reques...

Red Hat Security Advisory 2023-3556-01

Red Hat Security Advisory 2023-3556-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

RHSA-2023:3556: Red Hat Security Advisory: python3 security update

An update for python3 is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-24329: A flaw was found in the Python package. An issue in the urllib.parse component could allow attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.This may lead to compromised Integrity.

Red Hat Security Advisory 2023-3550-01

Red Hat Security Advisory 2023-3550-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.

CVE-2023-28043: DSA-2023-164: Dell Secure Connect Gateway Security Update for Multiple Vulnerabilities

Dell SCG 5.14 contains an information disclosure vulnerability during the SRS to SCG upgrade path. A remote low privileged malicious user could potentially exploit this vulnerability to retrieve the plain text.

CVE-2023-24329: Python URL Parse Problem – PointerNull

An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.