python3.11-3.11.13-5.3.el9_7
エラータID: AXSA:2026-521:09
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100)
* python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-4786
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
CVE-2026-6100
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
Update packages.
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
N/A
SRPMS
- python3.11-3.11.13-5.3.el9_7.src.rpm
MD5: d86fec166399fdefbdd89c185971b650
SHA-256: 212fa780d2859d5dcffa9829c4b8f4f5ff3a8869c06f626f0aa6bc6c04f460c5
Size: 19.27 MB
Asianux Server 9 for x86_64
- python3.11-3.11.13-5.3.el9_7.i686.rpm
MD5: a333c1059250b3cea5ca6f65bce2e672
SHA-256: ea68f811da66eae3ae95aba59e70a5dfc52705fd128d1f0567666f180c203c4f
Size: 25.05 kB - python3.11-3.11.13-5.3.el9_7.x86_64.rpm
MD5: 787b19e747b561b9bf81b8f6a801ce62
SHA-256: a299e77662cf76b0a74d260cfbabee862568f736679799cd25716a5bbacf2589
Size: 25.05 kB - python3.11-debug-3.11.13-5.3.el9_7.i686.rpm
MD5: 59cc5bd48224c6b1cac342ace4df0751
SHA-256: 69b2e1356cafac8e7ce27388c8124e8e0a31ea5f3b0497833c4b219e705d16f9
Size: 3.24 MB - python3.11-debug-3.11.13-5.3.el9_7.x86_64.rpm
MD5: c8bd20ee4a61485c26469a5859ef1857
SHA-256: c6d19d530098369c384d8b6cfac8b42e5adb0b559afceb4938a93ed35e49451b
Size: 3.39 MB - python3.11-devel-3.11.13-5.3.el9_7.i686.rpm
MD5: b75a7c96fdb0f4de1549213a6ced8d2c
SHA-256: e5e59c24e9f95051281bff85c81be08ca3b346b6278ac16b1149e2fcc1b306ea
Size: 280.12 kB - python3.11-devel-3.11.13-5.3.el9_7.x86_64.rpm
MD5: 740fcd2104c8451b620e947835b6ddcc
SHA-256: 31bc8a433119c37776aaa88652fc8c876de6cc5c0c944817a6bb4e4229a6e675
Size: 280.12 kB - python3.11-idle-3.11.13-5.3.el9_7.i686.rpm
MD5: 05bc4de887544ccf2ffe36f692cde21f
SHA-256: c508e5ea587311d82f636be1ed10184345e8a93afacfa03d759d720086165f05
Size: 1.09 MB - python3.11-idle-3.11.13-5.3.el9_7.x86_64.rpm
MD5: 3e1f05cabaced3c096170ad593f20b4d
SHA-256: 6827b1b6a13948cdc4a850dc9eb9dfcd10389e8a4ade2e20b9e7d60ebff8121f
Size: 1.09 MB - python3.11-libs-3.11.13-5.3.el9_7.i686.rpm
MD5: 7ccab12c90a3da42c1bc0fc7db743afd
SHA-256: cd114a621f1613831473b4d2ba92a3fa552cb85e133ccd5f1e843c34ef25ffd9
Size: 10.21 MB - python3.11-libs-3.11.13-5.3.el9_7.x86_64.rpm
MD5: 5ead529feaf7fed55008f42c5c13ce41
SHA-256: 890bc0fd54cb23276d650c8854428a314aa9a4b057e911f178e2ea9a4dffa8d0
Size: 10.17 MB - python3.11-test-3.11.13-5.3.el9_7.i686.rpm
MD5: b3736afda9ca16db65b12b0f04db312d
SHA-256: 1b84c4a71d849b02050ff6694b4cab34b432817bb616e547777415496ef3b612
Size: 15.36 MB - python3.11-test-3.11.13-5.3.el9_7.x86_64.rpm
MD5: fd7c5695ff68a805072364b524806c2d
SHA-256: 8443a37d6e7167a1df487c40af6dad99428c122a2c0673f5258775edf3652681
Size: 15.36 MB - python3.11-tkinter-3.11.13-5.3.el9_7.i686.rpm
MD5: cba52bbd04692ac471cdfa5e52ca4c91
SHA-256: 95944b3a3aab4fcfa59d47af4fddcc5ada7308feb9e380dd309ef614bae5f0a1
Size: 427.51 kB - python3.11-tkinter-3.11.13-5.3.el9_7.x86_64.rpm
MD5: b044adaa03b2c109352065fb14b129f4
SHA-256: 31a6d1714bffc241b91818b3eb99f217fdb166fa30e16e7a089d2ead64696b72
Size: 425.93 kB