{"type":"TYPE_SECURITY","shortCode":"RL","name":"RLSA-2022:7581","synopsis":"Moderate: python38:3.8 and python38-devel:3.8 security update","severity":"SEVERITY_MODERATE","topic":"An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8.\nRocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.","description":"Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. \nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\nAdditional Changes:\nFor detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.","solution":null,"affectedProducts":["Rocky Linux 8"],"fixes":[{"ticket":"2075390","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2075390","description":"CVE-2015-20107 python: mailcap: findmatch() function does not sanitize the second argument"},{"ticket":"2086141","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2086141","description":"Update python38-jinja2 to 2.11.x"},{"ticket":"2090006","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2090006","description":"Backport patch to handle TMPDIR in $PWD for pyproject macro support"},{"ticket":"2095265","sourceBy":"Red Hat","sourceLink":"https:\/\/bugzilla.redhat.com\/show_bug.cgi?id=2095265","description":"testsuite failures caused by expat: test_minidom, test_xml_etree_c, test_xml_etree"}],"cves":[{"name":"CVE-2015-20107","sourceBy":"Red Hat","sourceLink":"https:\/\/access.redhat.com\/hydra\/rest\/securitydata\/cve\/CVE-2015-20107.json","cvss3ScoringVector":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:L\/I:H\/A:L","cvss3BaseScore":"7.6","cwe":"CWE-20->CWE-77"}],"references":[],"publishedAt":"2023-01-30T05:25:46.816819Z","rpms":{},"rebootSuggested":false,"buildReferences":[]}

Rocky Linux: RLSA-2022:7581 python38

January 30, 2023
An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate

Summary

An update for the python38:3.8 and python38-devel:3.8 modules is now available for Rocky Linux 8. Rocky Enterprise Software Foundation Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.


Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Additional Changes: For detailed information on changes in this release, see the Rocky Linux 8.7 Release Notes linked from the References section.

RPMs

References

No References

CVEs

https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-20107.json

Severity
Name: RLSA-2022:7581
Affected Products: Rocky Linux 8

Fixes

https://bugzilla.redhat.com/show_bug.cgi?id=2075390

https://bugzilla.redhat.com/show_bug.cgi?id=2086141

https://bugzilla.redhat.com/show_bug.cgi?id=2090006

https://bugzilla.redhat.com/show_bug.cgi?id=2095265


Related News