Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2023:3594

Опубликовано: 31 авг. 2023
Источник: rocky
Оценка: Important

Описание

Important: python3.11 security update

Python is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries.

Security Fix(es):

  • python: urllib.parse url blocklisting bypass (CVE-2023-24329)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
python3.11x86_642.el8_8.1python3.11-3.11.2-2.el8_8.1.x86_64.rpm
python3.11-develx86_642.el8_8.1python3.11-devel-3.11.2-2.el8_8.1.x86_64.rpm
python3.11-libsx86_642.el8_8.1python3.11-libs-3.11.2-2.el8_8.1.x86_64.rpm
python3.11-rpm-macrosnoarch2.el8_8.1python3.11-rpm-macros-3.11.2-2.el8_8.1.noarch.rpm
python3.11-tkinterx86_642.el8_8.1python3.11-tkinter-3.11.2-2.el8_8.1.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

CVSS3: 7.5
redhat
больше 2 лет назад

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

CVSS3: 7.5
nvd
больше 2 лет назад

An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.

CVSS3: 7.5
msrc
больше 2 лет назад

Описание отсутствует

CVSS3: 7.5
debian
больше 2 лет назад

An issue in the urllib.parse component of Python before 3.11.4 allows ...