Headline
RHSA-2023:5531: Red Hat Security Advisory: python3 security update
An update for python3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-40217: Python 3 ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS certificate. No breach of confidentiality is possible.
Synopsis
Important: python3 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for python3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
- python: TLS handshake bypass (CVE-2023-40217)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2235789 - CVE-2023-40217 python: TLS handshake bypass
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
x86_64
platform-python-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 49fc4df9eb76fbedf83c9a5b980fdb9d7024b2657062911a4db72fd83baf159a
platform-python-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 6d8a2f988386ef4055b434cf0da1f25ff56e840f5e9ba18e1181a74c2a4bcd32
platform-python-debug-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 19e80c68cb27f9e0dcca15fded6c7a95fee2a56abb22738ee5e5542448de40b9
platform-python-debug-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 39d1481907074efc8eb7a9bc41536a94a47dabc456653a53cb40c6ce0256e632
platform-python-devel-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 72081b101335ede7fcc76e39e98316aefe1ca0e5190fba54df51463b26dfaab2
platform-python-devel-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: f4b894c48a85d67c16741cc771967771b684a7068076de36d9a0dbf83a3ea2f4
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-idle-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 8b6497b0d13562fd9906025e356ce89b472dc55d1e0c5b09b7cdf3a3eeeae319
python3-idle-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 9b0a81661f7dd99d476008fb65c5512a60d317a591601a8901e584b7f9a9733e
python3-libs-3.6.8-47.el8_6.2.i686.rpm
SHA-256: c865a6d8ef7f0c2093ca6da48914e106aaf47e7fa0c558f0730a3ca8fda7ff66
python3-libs-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 02492631e60690364d0ab78c31e784fa9c965d9e1c3d07c29cdee7e838e62615
python3-test-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5bcd9349df5514b457cc95af3f077af842f92952fece539af5a6431623cf0071
python3-test-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ba1b1f758b255babbe397c8d4ed91f6976b50912e2935099788c4c485c06bd0f
python3-tkinter-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 2168c887e21d69b5d6076b848cec2a477c035054e55810e1cfcd8e3f44c008af
python3-tkinter-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ab90ba8dc3c4bd2bae717b86ee182175a2b216bfdc4ed1d94d61ff31c19f48a4
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
x86_64
platform-python-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 49fc4df9eb76fbedf83c9a5b980fdb9d7024b2657062911a4db72fd83baf159a
platform-python-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 6d8a2f988386ef4055b434cf0da1f25ff56e840f5e9ba18e1181a74c2a4bcd32
platform-python-debug-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 19e80c68cb27f9e0dcca15fded6c7a95fee2a56abb22738ee5e5542448de40b9
platform-python-debug-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 39d1481907074efc8eb7a9bc41536a94a47dabc456653a53cb40c6ce0256e632
platform-python-devel-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 72081b101335ede7fcc76e39e98316aefe1ca0e5190fba54df51463b26dfaab2
platform-python-devel-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: f4b894c48a85d67c16741cc771967771b684a7068076de36d9a0dbf83a3ea2f4
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-idle-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 8b6497b0d13562fd9906025e356ce89b472dc55d1e0c5b09b7cdf3a3eeeae319
python3-idle-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 9b0a81661f7dd99d476008fb65c5512a60d317a591601a8901e584b7f9a9733e
python3-libs-3.6.8-47.el8_6.2.i686.rpm
SHA-256: c865a6d8ef7f0c2093ca6da48914e106aaf47e7fa0c558f0730a3ca8fda7ff66
python3-libs-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 02492631e60690364d0ab78c31e784fa9c965d9e1c3d07c29cdee7e838e62615
python3-test-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5bcd9349df5514b457cc95af3f077af842f92952fece539af5a6431623cf0071
python3-test-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ba1b1f758b255babbe397c8d4ed91f6976b50912e2935099788c4c485c06bd0f
python3-tkinter-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 2168c887e21d69b5d6076b848cec2a477c035054e55810e1cfcd8e3f44c008af
python3-tkinter-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ab90ba8dc3c4bd2bae717b86ee182175a2b216bfdc4ed1d94d61ff31c19f48a4
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
s390x
platform-python-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: c17ecf67fc4b8bdf4ea286985b1146010e5541eddc20c1c3477c8fca5f388b3f
platform-python-debug-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: 618364ae18af060c70b75d583a77b3cb1dade99e89516f3efcebadbd323e0693
platform-python-devel-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: 27f551c91605bc8d80a7bf060106240dd413d1a33ebbcd62bebed05c0d9e0943
python3-debuginfo-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: b74095fda5d6749e47a2751a954e9171fd37559e56bf83c985a9267dd2d564db
python3-debuginfo-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: b74095fda5d6749e47a2751a954e9171fd37559e56bf83c985a9267dd2d564db
python3-debugsource-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: 0612c3497d2fce5b380515b5e881a0993fbbe71c5953d52a922499ad49edd462
python3-debugsource-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: 0612c3497d2fce5b380515b5e881a0993fbbe71c5953d52a922499ad49edd462
python3-idle-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: 12f8501e38d65bf6e3b532ce68fe96905d2b99b14da42ec9eff277f4269d649d
python3-libs-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: 4efde184a5287ee52b38760896b225bd79464d77a9b4dd70be69b86c3c322c6e
python3-test-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: a0d6e32312fada7c5441f2bd191079638d798c729324a45c90617486cf87e195
python3-tkinter-3.6.8-47.el8_6.2.s390x.rpm
SHA-256: 2f11598548464c0e3661ee09571472144f98c562ecfb2d99db508ab7556b78c1
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
ppc64le
platform-python-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 9815c9f26e66684bcb37547415d60020e28dc24ed69e8f63b33b866398224004
platform-python-debug-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 315e79cc4c80440b07cc15d72274e163edb21beffddbc9bf98e697dbc28063d6
platform-python-devel-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 9c228a5146bed59e6d8b7462e740c336ed51b96b569259e1d5eefe0796fb3a8f
python3-debuginfo-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 4aacb68a30b7b87be730cfb747f674847eb1c326c040ba58ebed1c15bb50dee9
python3-debuginfo-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 4aacb68a30b7b87be730cfb747f674847eb1c326c040ba58ebed1c15bb50dee9
python3-debugsource-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 13922559edbbeac148bf62b6950f04d6d43fb774fa978ce787493a5ba934bd1c
python3-debugsource-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 13922559edbbeac148bf62b6950f04d6d43fb774fa978ce787493a5ba934bd1c
python3-idle-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 3443d387cfc7939e05b174086ea1a12741d1003df040bb28b5819a75f1ab9960
python3-libs-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 329bb6dc732d35127538d74fb9b101858709d9d87834d02c3cbec0574a18e715
python3-test-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 8f5bbd4236961df7acd89fab5708c43cbcce7d0c8e80b044b22e27866de34d8c
python3-tkinter-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 339c32a1052c98ba91de08e7c9e73f75fa24d09ce87ef3336fe24271b739f777
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
x86_64
platform-python-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 49fc4df9eb76fbedf83c9a5b980fdb9d7024b2657062911a4db72fd83baf159a
platform-python-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 6d8a2f988386ef4055b434cf0da1f25ff56e840f5e9ba18e1181a74c2a4bcd32
platform-python-debug-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 19e80c68cb27f9e0dcca15fded6c7a95fee2a56abb22738ee5e5542448de40b9
platform-python-debug-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 39d1481907074efc8eb7a9bc41536a94a47dabc456653a53cb40c6ce0256e632
platform-python-devel-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 72081b101335ede7fcc76e39e98316aefe1ca0e5190fba54df51463b26dfaab2
platform-python-devel-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: f4b894c48a85d67c16741cc771967771b684a7068076de36d9a0dbf83a3ea2f4
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-idle-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 8b6497b0d13562fd9906025e356ce89b472dc55d1e0c5b09b7cdf3a3eeeae319
python3-idle-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 9b0a81661f7dd99d476008fb65c5512a60d317a591601a8901e584b7f9a9733e
python3-libs-3.6.8-47.el8_6.2.i686.rpm
SHA-256: c865a6d8ef7f0c2093ca6da48914e106aaf47e7fa0c558f0730a3ca8fda7ff66
python3-libs-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 02492631e60690364d0ab78c31e784fa9c965d9e1c3d07c29cdee7e838e62615
python3-test-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5bcd9349df5514b457cc95af3f077af842f92952fece539af5a6431623cf0071
python3-test-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ba1b1f758b255babbe397c8d4ed91f6976b50912e2935099788c4c485c06bd0f
python3-tkinter-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 2168c887e21d69b5d6076b848cec2a477c035054e55810e1cfcd8e3f44c008af
python3-tkinter-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ab90ba8dc3c4bd2bae717b86ee182175a2b216bfdc4ed1d94d61ff31c19f48a4
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
aarch64
platform-python-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: d5846e54e784bb1731e57dba4a8576391830fe78ed98dd5443f94bc0389f8a3d
platform-python-debug-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: fee58348ff4c73e16093984ce7684471bb83897ffd0470f35634549b6c3b4ecf
platform-python-devel-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 328d073b145f8f7e46e73cd9d58ef1e24fe341c5d5b68b0ac77414efd5da0213
python3-debuginfo-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 35fa385f66e28bda299328d97e1589519b44da8a58d02b61f5795dae980e8024
python3-debuginfo-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 35fa385f66e28bda299328d97e1589519b44da8a58d02b61f5795dae980e8024
python3-debugsource-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 3d09aaf22ea52c5f7e6905c4b27dcb08875105032dba5e058262d89f34268ac9
python3-debugsource-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 3d09aaf22ea52c5f7e6905c4b27dcb08875105032dba5e058262d89f34268ac9
python3-idle-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 67801854d965fa97974384117115b224f7f88249e9699d0e310228e38c1c3d0d
python3-libs-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 957022a2848af01ef0be5bbf84c9acb504f506f31f5e20243dffe775a4f1665c
python3-test-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: d965f165886a2e3eb71c91d99382921dbd9479acdd214bcafb52893ecec43d3b
python3-tkinter-3.6.8-47.el8_6.2.aarch64.rpm
SHA-256: 5c3164fe1a1b39a4fc91fae8ae9abff6c94c2ac5f93eb5623857c9fc00a62a91
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
ppc64le
platform-python-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 9815c9f26e66684bcb37547415d60020e28dc24ed69e8f63b33b866398224004
platform-python-debug-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 315e79cc4c80440b07cc15d72274e163edb21beffddbc9bf98e697dbc28063d6
platform-python-devel-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 9c228a5146bed59e6d8b7462e740c336ed51b96b569259e1d5eefe0796fb3a8f
python3-debuginfo-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 4aacb68a30b7b87be730cfb747f674847eb1c326c040ba58ebed1c15bb50dee9
python3-debuginfo-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 4aacb68a30b7b87be730cfb747f674847eb1c326c040ba58ebed1c15bb50dee9
python3-debugsource-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 13922559edbbeac148bf62b6950f04d6d43fb774fa978ce787493a5ba934bd1c
python3-debugsource-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 13922559edbbeac148bf62b6950f04d6d43fb774fa978ce787493a5ba934bd1c
python3-idle-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 3443d387cfc7939e05b174086ea1a12741d1003df040bb28b5819a75f1ab9960
python3-libs-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 329bb6dc732d35127538d74fb9b101858709d9d87834d02c3cbec0574a18e715
python3-test-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 8f5bbd4236961df7acd89fab5708c43cbcce7d0c8e80b044b22e27866de34d8c
python3-tkinter-3.6.8-47.el8_6.2.ppc64le.rpm
SHA-256: 339c32a1052c98ba91de08e7c9e73f75fa24d09ce87ef3336fe24271b739f777
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
python3-3.6.8-47.el8_6.2.src.rpm
SHA-256: 0d0484535a59d3c566ff5b60848ec33986a03b4e267030be89e74e5b101d3586
x86_64
platform-python-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 49fc4df9eb76fbedf83c9a5b980fdb9d7024b2657062911a4db72fd83baf159a
platform-python-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 6d8a2f988386ef4055b434cf0da1f25ff56e840f5e9ba18e1181a74c2a4bcd32
platform-python-debug-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 19e80c68cb27f9e0dcca15fded6c7a95fee2a56abb22738ee5e5542448de40b9
platform-python-debug-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 39d1481907074efc8eb7a9bc41536a94a47dabc456653a53cb40c6ce0256e632
platform-python-devel-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 72081b101335ede7fcc76e39e98316aefe1ca0e5190fba54df51463b26dfaab2
platform-python-devel-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: f4b894c48a85d67c16741cc771967771b684a7068076de36d9a0dbf83a3ea2f4
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 9303e75f627ee67bbe9295c4e5cd0cd395ced1470bc484c63d166b4ba0fd942c
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debuginfo-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 5e32fb0ab9504942ff387b6d6edf9ed176b14f54faf7f60297833d5b50d6b9bf
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5771de345fe566cd0d07ede6864b01999638767dff4e9580b96a578971b17915
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-debugsource-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: d3ff1a204e4676a3e2efd174e5cf61b3eda029bd690419fffb8813b7c3bdb491
python3-idle-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 8b6497b0d13562fd9906025e356ce89b472dc55d1e0c5b09b7cdf3a3eeeae319
python3-idle-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 9b0a81661f7dd99d476008fb65c5512a60d317a591601a8901e584b7f9a9733e
python3-libs-3.6.8-47.el8_6.2.i686.rpm
SHA-256: c865a6d8ef7f0c2093ca6da48914e106aaf47e7fa0c558f0730a3ca8fda7ff66
python3-libs-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: 02492631e60690364d0ab78c31e784fa9c965d9e1c3d07c29cdee7e838e62615
python3-test-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 5bcd9349df5514b457cc95af3f077af842f92952fece539af5a6431623cf0071
python3-test-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ba1b1f758b255babbe397c8d4ed91f6976b50912e2935099788c4c485c06bd0f
python3-tkinter-3.6.8-47.el8_6.2.i686.rpm
SHA-256: 2168c887e21d69b5d6076b848cec2a477c035054e55810e1cfcd8e3f44c008af
python3-tkinter-3.6.8-47.el8_6.2.x86_64.rpm
SHA-256: ab90ba8dc3c4bd2bae717b86ee182175a2b216bfdc4ed1d94d61ff31c19f48a4
Related news
Dell vApp Manger, versions prior to 9.2.4.x contain an arbitrary file read vulnerability. A remote attacker could potentially exploit this vulnerability to read arbitrary files from the target system.
An issue exists in SoftIron HyperCloud where compute nodes may come online immediately without following the correct initialization process. In this instance, workloads may be scheduled on these nodes and deploy to a failed or erroneous state, which impacts the availability of these workloads that may be deployed during this time window. This issue impacts HyperCloud versions from 2.0.0 to before 2.0.3.
Ubuntu Security Notice 6513-2 - USN-6513-1 fixed vulnerabilities in Python. This update provides the corresponding updates for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, and Ubuntu 23.04. It was discovered that Python incorrectly handled certain plist files. If a user or an automated system were tricked into processing a specially crafted plist file, an attacker could possibly use this issue to consume resources, resulting in a denial of service.
Ubuntu Security Notice 6513-1 - It was discovered that Python incorrectly handled certain plist files. If a user or an automated system were tricked into processing a specially crafted plist file, an attacker could possibly use this issue to consume resources, resulting in a denial of service. It was discovered that Python instances of ssl.SSLSocket were vulnerable to a bypass of the TLS handshake. An attacker could possibly use this issue to cause applications to treat unauthenticated received data before TLS handshake as authenticated data after TLS handshake.
Red Hat Security Advisory 2023-6885-01 - An update for python is now available for Red Hat Enterprise Linux 7. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-5992-01 - An update for the python27:2.7 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-6069-01 - An update for the python39:3.9 and python39-devel:3.9 modules is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-6068-01 - An update for the python39:3.9 and python39-devel:3.9 modules is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Issues addressed include a bypass vulnerability.
Red Hat Security Advisory 2023-5528-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
An update for python3 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-40217: Python 3 ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS....
Red Hat Security Advisory 2023-5472-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include a bypass vulnerability.
An update for python3.9 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-40217: Python 3 ssl.SSLSocket is vulnerable to a bypass of the TLS handshake in certain instances for HTTPS servers and other server-side protocols that use TLS client authentication such as mTLS. This issue may result in a breach of integrity as its possible to modify or delete resources that are authenticated only by a TLS...
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)