python3.9-3.9.25-3.el9_7.3
エラータID: AXSA:2026-513:04
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100)
* python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-4786
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
CVE-2026-6100
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
Update packages.
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
N/A
SRPMS
- python3.9-3.9.25-3.el9_7.3.src.rpm
MD5: 14ba45854840b0abcb5e859346b8238a
SHA-256: e8d88a30e649808cc1aa3f0cde909eaf8c89fa0827a14498c8bbe788d4243883
Size: 19.86 MB
Asianux Server 9 for x86_64
- python3-3.9.25-3.el9_7.3.i686.rpm
MD5: 1f9bb8306ef4e5384500f808017d7985
SHA-256: 5bdc0c4503e163acdfd5cd5ef96fe4b09a9bd1967777d09783d7a008616ff42d
Size: 26.13 kB - python3-3.9.25-3.el9_7.3.x86_64.rpm
MD5: e07ad6c037e126d6c4e585ecbd284659
SHA-256: 626ee69885fb832ac6bd62b17ed4a82d514b0318ec0346738551703a94da9b06
Size: 26.15 kB - python3-debug-3.9.25-3.el9_7.3.i686.rpm
MD5: 3164d62a51f17a9822d0312f574a60e8
SHA-256: c841a1eb3554c776ce07ab1725bf6cd1b5300a81e846e794ad001c14afb6eeb9
Size: 2.88 MB - python3-debug-3.9.25-3.el9_7.3.x86_64.rpm
MD5: fe9f652d681ffaa7e22ee5271dc6f7c4
SHA-256: 97934449798e0ade5d1f349a9ae20c4766854cd636ab8966f2780b8befb7b810
Size: 3.04 MB - python3-devel-3.9.25-3.el9_7.3.i686.rpm
MD5: 97caf680871433f056c36be225bda752
SHA-256: 73a8e975314040c0ea00a062c776e2c9d9a87c786474ef8b9a9e2c46c0c9c59c
Size: 245.77 kB - python3-devel-3.9.25-3.el9_7.3.x86_64.rpm
MD5: cfb7dd170d82aba12eaa061fb6c952be
SHA-256: 0c7f1674b386cb1f57b5c3cee07ecf6bdbcf9edcf9b9f184f4b8fdf94c2efc89
Size: 245.65 kB - python3-idle-3.9.25-3.el9_7.3.i686.rpm
MD5: 2149e6becbc70da7d43ec8a1030b443a
SHA-256: 754fe0dcd4190941f8b58ca573e8f69630167968dc9d8a258dd6b65e7b9af6f1
Size: 889.29 kB - python3-idle-3.9.25-3.el9_7.3.x86_64.rpm
MD5: 966c6f58c35503ac798cf30b103ad9f6
SHA-256: 79ef2d05aec0bf5cd9580b3139d6cdb636d0ec33a8cffd75b0847cbc5e309d3c
Size: 889.45 kB - python3-libs-3.9.25-3.el9_7.3.i686.rpm
MD5: b70dd9195aa731887f7f927b1bff58fd
SHA-256: c3ce1e7579664e281b69ca4ff516f0b2b338240c65b09fb6431662af1b2ee665
Size: 8.10 MB - python3-libs-3.9.25-3.el9_7.3.x86_64.rpm
MD5: d656700cd9423633dd62bcb50d6688e2
SHA-256: 3061633097a1ed0dc76481fab90006596364aa30d8a8255fd268c4fcb71e4b93
Size: 8.04 MB - python3-test-3.9.25-3.el9_7.3.i686.rpm
MD5: a0922848c4afd6ec0b4455735b38fa01
SHA-256: d5616ab9e2d6537286dab168e93734ff029d1316367030e5b3448ca1ff1ef0c4
Size: 10.21 MB - python3-test-3.9.25-3.el9_7.3.x86_64.rpm
MD5: cdaddcb02f4e7858c3fc7011a8bcbcba
SHA-256: fca997ffb24c4a1e4fd4bca5aa7db7262f5619df459ab2ede45e0e948ea811c5
Size: 10.21 MB - python3-tkinter-3.9.25-3.el9_7.3.i686.rpm
MD5: fa70e30e67cb481d9530384ddde5fa5c
SHA-256: 76789932d1d389668d7889a7765d44a131472c52ecc099780d0dada0a19065ec
Size: 343.44 kB - python3-tkinter-3.9.25-3.el9_7.3.x86_64.rpm
MD5: 9118155b395555a0f466693180e5e671
SHA-256: fb0dab4769194bd5e814b21b30f5dd9d501e1f8c0378f7ad6f91b9f549849e94
Size: 342.29 kB - python-unversioned-command-3.9.25-3.el9_7.3.noarch.rpm
MD5: ff602e6b3d9aefbbc1ed8c56ff7e1c0c
SHA-256: 8dbbc3d664d7acd15e5ff29bb614783c87b6295eaa16a33a1b5386d94cd12d29
Size: 9.51 kB