python3.11-3.11.13-7.el8_10
エラータID: AXSA:2026-522:10
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: Python: Arbitrary code execution or information disclosure via use-after-free in decompression modules (CVE-2026-6100)
* python: cpython: Python: Arbitrary code execution via command injection in webbrowser.open() API (CVE-2026-4786)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2026-4786
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
CVE-2026-6100
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
Update packages.
Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details.
Use-after-free (UAF) was possible in the `lzma.LZMADecompressor`, `bz2.BZ2Decompressor`, and `gzip.GzipFile` when a memory allocation fails with a `MemoryError` and the decompression instance is re-used. This scenario can be triggered if the process is under memory pressure. The fix cleans up the dangling pointer in this specific error condition. The vulnerability is only present if the program re-uses decompressor instances across multiple decompression calls even after a `MemoryError` is raised during decompression. Using the helper functions to one-shot decompress data such as `lzma.decompress()`, `bz2.decompress()`, `gzip.decompress()`, and `zlib.decompress()` are not affected as a new decompressor instance is used per call. If the decompressor instance is not re-used after an error condition, this usage is similarly not vulnerable.
N/A
SRPMS
- python3.11-3.11.13-7.el8_10.src.rpm
MD5: c4354b7f3488cefe72d7a866803291d0
SHA-256: 3433b228a48d198c0b8b3c142125cfd12780bf1619972ee243263e0d5ac46328
Size: 19.27 MB
Asianux Server 8 for x86_64
- python3.11-3.11.13-7.el8_10.i686.rpm
MD5: 8c21a92c055e54bae517b3d13ed9f52a
SHA-256: 97c555b3368aad803419f11c36d08e1af0e5011798cd1870e3d3086ec71a0af3
Size: 31.34 kB - python3.11-3.11.13-7.el8_10.x86_64.rpm
MD5: 433f5b91efb6036ab854f97a99a311ce
SHA-256: 38e181e93c2e6faf75fd5f30cbaad7916c562e885e2aafca640ec3b9a22412f1
Size: 31.26 kB - python3.11-debug-3.11.13-7.el8_10.i686.rpm
MD5: 8bab1f3b7cf7292ce43c4b8362aa376f
SHA-256: e1dc846fa073d973ae0572216b75171d25ad13e7059e4bf9109ba099e9a47c32
Size: 3.20 MB - python3.11-debug-3.11.13-7.el8_10.x86_64.rpm
MD5: 46ad3220e2793ed0339cd07d00f590b9
SHA-256: 293303af79e35b267615408e5b307435e655ff1c9b6c34b23fbbf47a1cf76294
Size: 3.33 MB - python3.11-devel-3.11.13-7.el8_10.i686.rpm
MD5: de7a88da0355cd2307d7e158235d13ea
SHA-256: 1c37e61ce255896f2b16f9a5e0ffcb8d9c00c2e126ab01a4857dab07617a7c17
Size: 249.37 kB - python3.11-devel-3.11.13-7.el8_10.x86_64.rpm
MD5: d5cb5a0455a37a97cad9dbdefa4812d1
SHA-256: a183ca8a4f4f2a48626ab6c222dbc4908859a2fa3fa94e57f1d003f260f5bd8b
Size: 249.33 kB - python3.11-idle-3.11.13-7.el8_10.i686.rpm
MD5: 7df0f1b8b093302b562d5e0412300be0
SHA-256: 64333fd90d27ab453347c3fc76b42499c8631d00ecb34e80e19a47fd53c2f03d
Size: 1.32 MB - python3.11-idle-3.11.13-7.el8_10.x86_64.rpm
MD5: 203e77b5dc6a0d3833070f94ab283280
SHA-256: d67a7619e8dd280b1fc7847fe71f351fe94a773d84443a3460addb00aff739e9
Size: 1.32 MB - python3.11-libs-3.11.13-7.el8_10.i686.rpm
MD5: 8bc2ba960d946607caf549a10191dad2
SHA-256: 9c947221794d6bff15faee259d688ce60976c22f0bbca199141d7fdb7a12c405
Size: 10.51 MB - python3.11-libs-3.11.13-7.el8_10.x86_64.rpm
MD5: 4e05b9daed2b4ff4155fec5653be1a61
SHA-256: 25aeb249bb9827555b8e14e4af881add3957ba390e52eb57787602f1970391e6
Size: 10.41 MB - python3.11-rpm-macros-3.11.13-7.el8_10.noarch.rpm
MD5: 7dd14e190698d63a2ac2522807ca0baf
SHA-256: 148cc56914793e9682be46162600885b063e92598c4004b54d808872aae57780
Size: 15.71 kB - python3.11-test-3.11.13-7.el8_10.i686.rpm
MD5: 5b462dd2f87eb671ae5c4818506b5177
SHA-256: b1f5db5cb7a8701bcf9541d8561c49fe3dfcead9e863a212faae045db27a410e
Size: 15.76 MB - python3.11-test-3.11.13-7.el8_10.x86_64.rpm
MD5: 79de1eb5c802bf67deb18b301dec624f
SHA-256: 01084c21ce7bbcf3fd79d8f98603a657b3709bc3aa08d665e5eb527c3ab36277
Size: 15.75 MB - python3.11-tkinter-3.11.13-7.el8_10.i686.rpm
MD5: 94e1e8ccb9a39df856a0486d75358485
SHA-256: ac8a85fb04615633233ea63986edda390c9c8a913ebb66c88f92a07d54d81efd
Size: 411.52 kB - python3.11-tkinter-3.11.13-7.el8_10.x86_64.rpm
MD5: 0439c7696057ece7c1b2c9ff3656886c
SHA-256: a741a6698d37b8b645328f0fe754430613e20fc80ae13c5ee2e2bc25b112f9cb
Size: 410.02 kB