Release date:
2025-10-17 13:22:10 UTC
Description:
* SECURITY UPDATE: Web cache poisoning vulnerability
- debian/patches/CVE-2021-23336.patch: fix web cache poisoning
via urllib.parse.parse_qsl and urllib.parse.parse_qs
- CVE-2021-23336
* SECURITY UPDATE: Regular expression denial of service
- debian/patches/CVE-2021-3733.patch: fix flaw in urllib’s
AbstractBasicAuthHandler that could lead to a denial of service
by leveraging a regular expression
- CVE-2021-3733
* SECURITY UPDATE: Constant-time-defeating optimisations issue
- debian/patches/CVE-2022-48566.patch: make compare_digest more
constant-time
- CVE-2022-48566
* SECURITY UPDATE: Incorrect parsing of email addresses containing special
characters
- debian/patches/CVE-2023-27043.patch: Fix email address parsing errors by
adding optional 'strict' parameter to getaddresses() and parseaddr()
functions
- CVE-2023-27043
* SECURITY UPDATE: TLS handshake bypass
- debian/patches/CVE-2023-40217.patch: Check for & avoid the ssl
pre-close flaw. Update SSL tests
- CVE-2023-40217
Updated packages:
-
alt-python27_2.7.18-8_amd64.deb
sha:bee09b6cf2c5e6dafa8653e54b1368b8a8295cbd
-
alt-python27-debug_2.7.18-8_amd64.deb
sha:84494f7932650c95adb2e7a4f456cc215d4ea4a5
-
alt-python27-devel_2.7.18-8_amd64.deb
sha:81708a40166435987baffccf2b4281e7fcd8d6ec
-
alt-python27-idle_2.7.18-8_amd64.deb
sha:46b11ae3acf7701f024de16c040acd7c04b66573
-
alt-python27-libs_2.7.18-8_amd64.deb
sha:732fcd77ce7d13a880d1f291c8b0fa1e2cc802da
-
alt-python27-test_2.7.18-8_amd64.deb
sha:e92e8fa178d517f8ffb3c7ed12e839d64b9e4d00
-
alt-python27-tkinter_2.7.18-8_amd64.deb
sha:7642867bb8f491ceafecd3726579c624bcc14215
-
alt-python27-tools_2.7.18-8_amd64.deb
sha:ae5a5083ecda831e3707245ab5b96ebdb6a2029e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.