Description:
- CVE-2021-3426: Remove the pydoc getfile feature which could lead to
information disclosure (rhbz#1935913)
- CVE-2021-3737: urllib: HTTP client possible infinite loop on a 100 Continue
response (rhbz#2036020)
- CVE-2021-4189: ftplib should not use the host from the PASV response
(rhbz#2036020)
- CVE-2022-0391: urllib.parse does not sanitize URLs containing ASCII newline
and tabs (rhbz#2047376)
Updated packages:
-
python3-idle-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:ec92585c85378948c8788de322f56d08d409368e
-
python3-tkinter-3.6.8-39.el8_4.tuxcare.els1.i686.rpm
sha:9e7a7cc6a46a4ffc38663a168a72f7d51ea004ed
-
platform-python-devel-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:8f9b8fc41cdcda5bf38ba211880aa4f97e7752e0
-
python3-libs-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:5b9d7a90a57bbdd7322a46d0f9d44536be8980fe
-
python3-devel-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:99c848b67b0b3bcf5f876ff1d01d6d09b6b30b0c
-
platform-python-debug-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:e5885cdda8516058f32e548c867d5fb40d7b951d
-
python3-idle-3.6.8-39.el8_4.tuxcare.els1.i686.rpm
sha:ae6cb1bdcb386fa29d4909801fa288407dd99a38
-
platform-python-3.6.8-39.el8_4.tuxcare.els1.i686.rpm
sha:1318b680ad7fefb5eaea2ba7d52ec104fcb5bd19
-
platform-python-devel-3.6.8-39.el8_4.tuxcare.els1.i686.rpm
sha:42b8c232854b0932ccd9abf834390825a880c811
-
platform-python-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:cc0f86d1b40056cfd396bd6a053c8bb0d428e10d
-
python3-test-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:aa8d94dc219bdce7e76de44a12048e7176bbd348
-
platform-python-debug-3.6.8-39.el8_4.tuxcare.els1.i686.rpm
sha:6f13535006d4f39f9961c0bd566d503553649dca
-
python3-libs-3.6.8-39.el8_4.tuxcare.els1.i686.rpm
sha:32d259dfa32bbbee85569fd9e6e946b1eb43eaf6
-
python3-test-3.6.8-39.el8_4.tuxcare.els1.i686.rpm
sha:cc4ebab49c68fdcbfab999068aa502732272bd08
-
python3-tkinter-3.6.8-39.el8_4.tuxcare.els1.x86_64.rpm
sha:eb0ad8e1849a15f8717e03546f55bfe0e7e11001
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.