python3.12-3.12.12-4.el9_7.3
エラータID: AXSA:2026-519:12
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100)
* python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-4786
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
CVE-2026-6100
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
Update packages.
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
N/A
SRPMS
- python3.12-3.12.12-4.el9_7.3.src.rpm
MD5: 29f81e079245cf7ec9930be76742d1de
SHA-256: 6221887ae89288ca1710a570856a295ee9d49abc604004761518cbcbba8807bf
Size: 19.91 MB
Asianux Server 9 for x86_64
- python3.12-3.12.12-4.el9_7.3.i686.rpm
MD5: 047412f7d0d7b2f3543544ec8b1042d0
SHA-256: 7ee59c6133b87eb93cb00a7c5e10e38734b99713481f78d3bfb2920bcbbbfdcf
Size: 25.81 kB - python3.12-3.12.12-4.el9_7.3.x86_64.rpm
MD5: d34fdc7eafc03843ff4bd20e27318487
SHA-256: 92ca9525a61a22eded2732bd4e918c6df3572f731a31c86e54d3754d9dd50097
Size: 25.82 kB - python3.12-debug-3.12.12-4.el9_7.3.i686.rpm
MD5: 016e7d180e938cc5d18a01e5394fe4d7
SHA-256: c4cbbd1b29588d60135a580d67f56520ebb400a7b2d47359b985070bbe6f145d
Size: 3.54 MB - python3.12-debug-3.12.12-4.el9_7.3.x86_64.rpm
MD5: 472d08e2f61f231c19db1fd10f465c29
SHA-256: 17c482d1cac836ba1505b1baf7f3a15de8cb4b5697b57633fe5cd90bab921ff6
Size: 3.71 MB - python3.12-devel-3.12.12-4.el9_7.3.i686.rpm
MD5: 2c4c3f8cb519f6024b415b3cdb1834ac
SHA-256: 245dbece2ee55f5beec9b4f93ec7a1116ee44283a1d8d5605897f15b6f479484
Size: 327.42 kB - python3.12-devel-3.12.12-4.el9_7.3.x86_64.rpm
MD5: 24c2534ccf851f334a76c17a7c1b2e48
SHA-256: 3e065481652d4dc4b86413365bb3f0956477aab4c6e53c79422307441306a858
Size: 327.46 kB - python3.12-idle-3.12.12-4.el9_7.3.i686.rpm
MD5: 0aecb2a84e566e156607daa541383a9b
SHA-256: b129731b8eefea566103071d3fabd49668fa6b92fdf5601f21aa8f8eaaacfc27
Size: 1.07 MB - python3.12-idle-3.12.12-4.el9_7.3.x86_64.rpm
MD5: 9c9a8ea5c6a578207b2b3d828844cdc9
SHA-256: 1630bc11184ad04571fc628dcdaddc824c4980fc34462b844798c83b193334ac
Size: 1.07 MB - python3.12-libs-3.12.12-4.el9_7.3.i686.rpm
MD5: 63485a90703785e5edf20c72f5b7d135
SHA-256: 1895483f68f9a582dfaa3334044f05608509b59e8256b9a3ecfebcda6af5551c
Size: 9.72 MB - python3.12-libs-3.12.12-4.el9_7.3.x86_64.rpm
MD5: d0c99ec679ae30359c80d5f7b6169905
SHA-256: 20cd37685585fabed9bdc475e2128ae4f617a3cbf5960900c138c08bb054d1cf
Size: 9.69 MB - python3.12-test-3.12.12-4.el9_7.3.i686.rpm
MD5: d986284095cae2282bd8143cc377da60
SHA-256: 4a23a394ed68fbde17962b519711a2f14d6eec2f91492a7b60dc472e62a45454
Size: 15.75 MB - python3.12-test-3.12.12-4.el9_7.3.x86_64.rpm
MD5: b3d0873a9985d240a4ab535fbb9f3c6a
SHA-256: b4c8e170e9c576b29f5a4ef8ca6dcce6de2425e821e588e37957f76cfeaf2d4a
Size: 15.74 MB - python3.12-tkinter-3.12.12-4.el9_7.3.i686.rpm
MD5: 2b2a6714b73715d25355e467ce1910ad
SHA-256: 62f5d576503d0488569d2fd175c495136952438192e843e2978939ea64559a16
Size: 421.39 kB - python3.12-tkinter-3.12.12-4.el9_7.3.x86_64.rpm
MD5: 7ae07d3ea8d9d3834c7051f59efab630
SHA-256: 7cd1f8481a18027d5a74b53a2a60976a2c0f9d0af3afb25a2dc42ca19a4d1bcb
Size: 420.35 kB