Fedora Linux 8814 Published by

A python3.6 security update has been released for Fedora 37.



[SECURITY] Fedora 37 Update: python3.6-3.6.15-16.fc37


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2023-56cefa23df
2023-06-04 01:22:42.043791
--------------------------------------------------------------------------------

Name : python3.6
Product : Fedora 37
Version : 3.6.15
Release : 16.fc37
URL : https://www.python.org/
Summary : Version 3.6 of the Python interpreter
Description :
Python 3.6 package for developers.

This package exists to allow developers to test their code against an older
version of Python. This is not a full Python stack and if you wish to run
your applications with Python 3.6, see other distributions
that support it, such as CentOS or RHEL with Software Collections
or older Fedora releases.

--------------------------------------------------------------------------------
Update Information:

Security fix for CVE-2023-24329
--------------------------------------------------------------------------------
ChangeLog:

* Fri May 26 2023 Charalampos Stratakis [cstratak@redhat.com] - 3.6.15-16
- Security fix for CVE-2023-24329
- Resolves: rhbz#2174013
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2174013 - CVE-2023-24329 python3.6: python: urllib.parse url blocklisting bypass [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2174013
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2023-56cefa23df' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------