BZ#1918168 CVE-2021-3177 python: stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
BZ#1918666 CVE-2021-3177 python3.7: python: stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c [fedora-all]
BZ#1928904 CVE-2021-23336 python: Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
BZ#1928919 CVE-2021-23336 python3.7: python: Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters [fedora-all]
This update has been submitted for stable by bodhi.
BZ#1918168 CVE-2021-3177 python: stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c
0
1
BZ#1918666 CVE-2021-3177 python3.7: python: stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c [fedora-all]
0
1
BZ#1928904 CVE-2021-23336 python: Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters
0
1
BZ#1928919 CVE-2021-23336 python3.7: python: Web Cache Poisoning via urllib.parse.parse_qsl and urllib.parse.parse_qs by using a semicolon in query parameters [fedora-all]
This update has been submitted for testing by churchyard.
This update's test gating status has been changed to 'ignored'.
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'ignored'.
This update has been pushed to testing.
Works well and fixes all mentioned CVEs.
This update has been submitted for stable by bodhi.
This update has been pushed to stable.