Rocky Linux: RLSA-2023:0833 python3 security update
Summary
An update is available for python3. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
RPMs
platform-python-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
platform-python-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
platform-python-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
platform-python-debug-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
platform-python-debug-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
platform-python-debug-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
platform-python-devel-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
platform-python-devel-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
platform-python-devel-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
python3-0:3.6.8-48.el8_7.1.rocky.0.src.rpm
python3-debuginfo-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
python3-debuginfo-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
python3-debugsource-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
python3-debugsource-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
python3-debugsource-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
python3-idle-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
python3-idle-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
python3-idle-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
python3-libs-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
python3-libs-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
python3-libs-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
python3-test-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
python3-test-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
python3-test-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
python3-tkinter-0:3.6.8-48.el8_7.1.rocky.0.aarch64.rpm
python3-tkinter-0:3.6.8-48.el8_7.1.rocky.0.i686.rpm
python3-tkinter-0:3.6.8-48.el8_7.1.rocky.0.x86_64.rpm
References
No References
CVEs
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45061
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=1834423
https://bugzilla.redhat.com/show_bug.cgi?id=2120642
https://bugzilla.redhat.com/show_bug.cgi?id=2144072