Name: | python2-debug |
---|---|
Version: | 2.7.18 |
Release: | 13.0.1.module+el8.8.0+21096+ceeb3972.1 |
Architecture: | x86_64 |
Module: | python27:2.7:8080020230609134836:392b0bf1 |
Group: | Applications/System |
Size: | 7288444 |
License: | Python |
RPM: | python2-debug-2.7.18-13.0.1.module+el8.8.0+21096+ceeb3972.1.x86_64.rpm |
Source RPM: | python2-2.7.18-13.0.1.module+el8.8.0+21096+ceeb3972.1.src.rpm |
Build Date: | Wed Jun 28 2023 |
Build Host: | build-ol8-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | https://www.python.org/ |
Summary: | Debug version of the Python 2 runtime |
Description: | python2-debug provides a version of the Python 2 runtime with numerous debugging features enabled, aimed at advanced Python users, such as developers of Python extension modules. This version uses more memory and will be slower than the regular Python 2 build, but is useful for tracking down reference-counting issues, and other bugs. The bytecodes are unchanged, so that .pyc files are compatible between the two version of Python 2, but the debugging features mean that C/C++ extension modules are ABI-incompatible with those built for the standard runtime. It shares installation directories with the standard Python 2 runtime, so that .py and .pyc files can be shared. All compiled extension modules gain a "_d" suffix ("foo_d.so" rather than "foo.so") so that each Python 2 implementation can load its own extensions. |
- Fix for CVE-2023-24329 - Add missing part of fix for CVE-2022-45061
- Add Oracle Linux distribution in platform.py [Orabug: 20812544]
- Security fix for CVE-2022-45061: CPU denial of service via inefficient IDNA decoder Resolves: rhbz#2144072
- Security fix for CVE-2015-20107 - Fix the test suite support for Expat >= 2.4.5 Resolves: rhbz#2075390
- Security fix for CVE-2022-0391: urlparse does not sanitize URLs containing ASCII newline and tabs Resolves: rhbz#2047376
- Security fix for CVE-2021-4189: ftplib should not use the host from the PASV response Resolves: rhbz#2036020
- Security fixes for CVE-2021-3737 and CVE-2021-3733 Resolves: rhbz#1995162 and rhbz#1995234
- Adjusted the postun scriptlets to enable upgrading to RHEL 9 - Resolves: rhbz#1933055
- Security fix for CVE-2020-27619: eval() call on content received via HTTP in the CJK codec tests Resolves: rhbz#1889886
- Fix for CVE-2021-23336 Resolves: rhbz#1928904