Description:
- CVE-2021-3737: urllib: HTTP client possible infinite loop on a 100 Continue response (rhbz#2036020)
- CVE-2021-4189: ftplib should not use the host from the PASV response (rhbz#2036020)
- CVE-2022-0391: urllib.parse does not sanitize URLs containing ASCII newline and tabs (rhbz#2047376)
Updated packages:
-
python3-libs-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:268776637e890df7692bbe6acd2d4b1424eb6751
-
platform-python-devel-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:e154679da008d76f14ab9ddba4c45e5a4012600e
-
platform-python-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:83626de7c358f400fd646efba9216780044059af
-
platform-python-3.6.8-41.el8.tuxcare.els1.i686.rpm
sha:01a26cb74185a30b0de846bb2cd8ca09c63821c3
-
python3-tkinter-3.6.8-41.el8.tuxcare.els1.i686.rpm
sha:104bbfb4ff1c212591ed41b5f70a3e7191dd110b
-
python3-libs-3.6.8-41.el8.tuxcare.els1.i686.rpm
sha:bdf822d75e7f0fc7649d57ce1869b161758a9320
-
python3-test-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:8518ced3c94299f2b27b3906d43cec34c239a558
-
python3-idle-3.6.8-41.el8.tuxcare.els1.i686.rpm
sha:4a898c1858ade72b7acb51b1e0449b311f1e02ae
-
platform-python-devel-3.6.8-41.el8.tuxcare.els1.i686.rpm
sha:055eaa1f6d12cf4e88ad2eb3edbe38479b607a8e
-
python3-idle-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:dfd78340723ca14ad52eba8dd3e6b0255c011c75
-
platform-python-debug-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:efb3ad43c1234934a7b98e19c682dce6a6acba0e
-
python3-devel-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:8ac99aed820609fd4bf9894b7e65a58c50a37455
-
python3-tkinter-3.6.8-41.el8.tuxcare.els1.x86_64.rpm
sha:35086589aee4e35b711a065ff7a3cd076116133f
-
python3-test-3.6.8-41.el8.tuxcare.els1.i686.rpm
sha:cda34866cabb39f9a5190cc5b0d0a7ff22a5e9cb
-
platform-python-debug-3.6.8-41.el8.tuxcare.els1.i686.rpm
sha:0cd94306cb66988f2d735f8e52aa9a534f8bfd73
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.