Name: | platform-python-debug |
---|---|
Version: | 3.6.8 |
Release: | 39.0.1.el8_4 |
Architecture: | aarch64 |
Group: | Unspecified |
Size: | 11634254 |
License: | Python |
RPM: | platform-python-debug-3.6.8-39.0.1.el8_4.aarch64.rpm |
Source RPM: | python3-3.6.8-39.0.1.el8_4.src.rpm |
Build Date: | Tue Nov 02 2021 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | https://www.python.org/ |
Summary: | Debug version of the Python runtime |
Description: | python3-debug provides a version of the Python runtime with numerous debugging features enabled, aimed at advanced Python users such as developers of Python extension modules. This version uses more memory and will be slower than the regular Python build, but is useful for tracking down reference-counting issues and other bugs. The bytecode format is unchanged, so that .pyc files are compatible between this and the standard version of Python, but the debugging features mean that C/C++ extension modules are ABI-incompatible and must be built for each version separately. The debug build shares installation directories with the standard Python runtime, so that .py and .pyc files can be shared. Compiled extension modules use a special ABI flag ("d") in the filename, so extensions for both versions can co-exist in the same directory. |
- Add Oracle Linux distribution in platform.py [Orabug: 20812544]
- Security fix for CVE-2021-3733: Denial of service when identifying crafted invalid RFCs Resolves: rhbz#1995234
- Fix reentrant call to threading.enumerate() Resolves: rhbz#1990860
- Fix for CVE-2021-23336 Resolves: rhbz#1928904
- Fix for CVE-2021-3177 Resolves: rhbz#1918168
- New options -a and -k for pathfix.py script backported from upstream Resolves: rhbz#1917691
- Security fix for CVE-2020-27619: eval() call on content received via HTTP in the CJK codec tests Resolves: rhbz#1890237
- Add support for upstream architecture names https://fedoraproject.org/wiki/Changes/Python_Upstream_Architecture_Names Resolves: rhbz#1868003
- Security fix for CVE-2020-26116: Reject control chars in HTTP method in http.client Resolves: rhbz#1883257
- Avoid infinite loop when reading specially crafted TAR files (CVE-2019-20907) Resolves: rhbz#1856481 - Resolve hash collisions for Pv4Interface and IPv6Interface (CVE-2020-14422) Resolves: rhbz#1854926