[CLSA-2024:1717692229] python3: Fix of 3 CVEs
Type:
security
Severity:
Moderate
Release date:
2024-06-06 16:43:52 UTC
Description:
- Remove -b option, use original maintainer approach - Fix expat regression tests for xml_etree - CVE-2022-48564: Improve validation of Plist files that prevent DoS - CVE-2023-40217: Fix TLS handshake bypass - CVE-2023-27043: reject malformed addresses in email.parseaddr()
Updated packages:
  • platform-python-3.6.8-42.el8.tuxcare.els5.i686.rpm
    sha:86b91deb2d1e3a14327ebf2fc321ca93fb3ff390
  • platform-python-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:5f3a096a067263689bec63b7c4ac57f5256bd959
  • platform-python-debug-3.6.8-42.el8.tuxcare.els5.i686.rpm
    sha:9291223f9e16cfffee277b4a9a35734a87f88229
  • platform-python-debug-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:5c77664858a901968155e8105b73dec1449db9d8
  • platform-python-devel-3.6.8-42.el8.tuxcare.els5.i686.rpm
    sha:e82ae7f6c2600b394e2c7840221d74a37d7d046a
  • platform-python-devel-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:9bc9b299e170fb136bb4c4465da7e4ad230a02ab
  • python3-devel-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:7b403af13b3dd836631553a4c9ea0e3f4303cc2e
  • python3-idle-3.6.8-42.el8.tuxcare.els5.i686.rpm
    sha:5a566d28e212900fe63ebeb39b5e5f01e5ceabac
  • python3-idle-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:2ef2b06bb90ebc05b1fa0f49292f32d1a91389b5
  • python3-libs-3.6.8-42.el8.tuxcare.els5.i686.rpm
    sha:1e20738ff3fccba4613ee65b5bd6ec5e8d6ef76b
  • python3-libs-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:a3935ecd69918e1bfa60d02b41f5970b8d390a75
  • python3-test-3.6.8-42.el8.tuxcare.els5.i686.rpm
    sha:50627c0c0af2cfa4af551984f4f45cffb96d50a8
  • python3-test-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:391e2ba2bb0dc648286327972b538191a5306c9b
  • python3-tkinter-3.6.8-42.el8.tuxcare.els5.i686.rpm
    sha:bb59af1211f3d03740d22b6421a544710172690b
  • python3-tkinter-3.6.8-42.el8.tuxcare.els5.x86_64.rpm
    sha:c8bd2af6a0a3363cbb9e9a9570a2fd9c82731f6c
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.