sidebar hamburger menu

Python Libraries

Endless Lifecycle Support (ELS) for Libraries from TuxCare provides security fixes for a variety of Python Libraries. This allows you to continue running your Python applications without vulnerability concerns, even after official support has ended.

Supported Python Libraries

  • aiohttp 3.8.1, 3.8.4, 3.8.5, 3.8.6
  • certifi 2021.10.8, 2022.12.7, 2023.7.22
  • cryptography 3.4.8, 41.0.7, 42.0.0, 42.0.8, 43.0.1, 43.0.3, 44.0.3, 45.0.7
  • deepdiff 6.2.3
  • dnspython 2.3.0
  • flask-cors 4.0.2
  • future 1.0.0
  • GitPython 3.1.31
  • gunicorn 20.0.4, 20.1.0, 21.2.0, 22.0.0
  • h11 0.9.0
  • httpx 0.22.0
  • idna 2.1, 2.8, 2.10, 3.6
  • jaraco-context 5.3.0
  • Jinja2 2.11.3, 3.0.3
  • MLflow 2.22.4
  • MySQL Connector/Python 8.4.0
  • orjson 3.8.5
  • pandas 2.2.0, 2.2.2
  • paramiko 3.0.0
  • pdfkit 0.6.1
  • pip 9.0
  • Pillow 8.4.0, 9.4.0, 9.5.0, 11.2.1
  • protobuf 3.17.0, 3.20.0, 4.24.3, 4.25.8
  • pydantic 1.10.5
  • PyJWT 1.7.1, 2.3.0, 2.8.0, 2.10.1
  • pymongo 3.13.0
  • pymysql 0.10.1
  • pypdf 5.9.0
  • python-jose 3.3.0
  • python-multipart 0.0.6
  • PyYAML 3.13, 5.3.1
  • redis-py 4.5.1
  • requests 2.25.1, 2.30.0, 2.31.0, 2.32.3
  • scikit-learn 1.0.2
  • setuptools 65.5.1, 68.0.0, 70.3.0, 75.0.0, 75.8.0
  • torch 1.13.1
  • tornado 6.1.0
  • tqdm 4.66.1
  • twisted 20.3.0
  • urllib3 1.25.11, 1.26.4, 1.26.20, 2.0.7
  • uvicorn 0.11.6
  • waitress 2.1.2
  • websockets 8.1

Other libraries upon request.

Connection to ELS for Python Libraries Repository

This guide outlines the steps needed to integrate the TuxCare ELS for Python Libraries repository.

Step 1: Get user credentials

You need a username and password in order to use TuxCare ELS for Python Libraries repository. Anonymous access is disabled. To receive the credentials please contact sales@tuxcare.com.

Step 2: Set Up ELS for Python Libraries

To use TuxCare's ELS for Python libraries, follow one of the options below:

Option 1: Install a Package with ELS Repository via Command Line

You can install or upgrade a package directly using the ELS repository with your credentials:

pip install --upgrade \
  -i https://<username>:<password>@nexus.repo.tuxcare.com/repository/els_python/simple \
  <package>

Replace:

  • <username> and <password> with the credentials provided by sales.
  • <package> - with the Python package name (e.g., certifi).

Option 2: Configure pip to Use the ELS Repository (Full Replacement)

This method is recommended if you want to use only ELS-patched Python packages from TuxCare and replace the default PyPI source with the TuxCare ELS repository.

  1. Create or update the pip configuration file and add the following:

    [global]
    index-url = https://username:password@nexus.repo.tuxcare.com/repository/els_python/simple
  2. Run the command to install the latest package version:

    pip install --upgrade <package>
    

    Replace <package> with the python package name, for example, certifi.

    Or install a specific patched TuxCare version, for example:

    pip install certifi==2021.10.8.post2+tuxcare
    

Option 3: Add the TuxCare ELS Repository as Additional (recommended)

If you want to keep using public PyPI and fetch only specific patched packages from TuxCare, use extra-index-url instead. In this configuration, make sure to specify the exact patched version (step 2 below), otherwise pip may install the version from public PyPI.

  1. Create or update the pip configuration file and add the following:

    [global]
    extra-index-url = https://username:password@nexus.repo.tuxcare.com/repository/els_python/simple
  2. Run the command to install a specific patched TuxCare version, for example:

    pip install certifi==2021.10.8.post2+tuxcare
    

Upgrading to a Newer TuxCare Version

To upgrade to a newer TuxCare release (e.g., from version.post1+tuxcare to version.post2+tuxcare) use the same installation method you used above and specify the newer package version.

Vulnerability Exploitability eXchange (VEX)

VEX is a machine-readable format that tells you if a known vulnerability is actually exploitable in your product. It reduces false positives, helps prioritize real risks.

TuxCare provides VEX for Python Libraries ELS versions: security.tuxcare.com/vex/cyclonedx/els_lang_python/.

Resolved CVEs

Fixes for the following vulnerabilities are available in ELS for Python Libraries from TuxCare versions:

Select library:
CVE IDSeverityVulnerable VersionsSafe Version
CVE-2025-53643High< 3.12.143.8.1.post5+tuxcare
CVE-2024-52304High< 3.10.113.8.1.post7+tuxcare
CVE-2024-52304High< 3.10.113.8.5.post2+tuxcare
CVE-2024-30251High< 3.9.43.8.1.post4+tuxcare
CVE-2024-30251High< 3.9.43.8.6.post1+tuxcare
CVE-2024-27306Medium< 3.9.43.8.1.post6+tuxcare
CVE-2024-23829Medium< 3.9.23.8.1.post3+tuxcare
CVE-2024-23829Medium< 3.9.23.8.5.post3+tuxcare
CVE-2024-23334High>= 1.0.5, < 3.9.23.8.1.post7+tuxcare
CVE-2024-23334High>= 1.0.5, < 3.9.23.8.5.post3+tuxcare
CVE-2023-49082Medium< 3.9.03.8.1.post6+tuxcare
CVE-2023-49082Medium< 3.9.03.8.5.post1+tuxcare
CVE-2023-49082Medium< 3.9.03.8.6.post2+tuxcare
CVE-2023-49081Medium< 3.9.03.8.1.post2+tuxcare
CVE-2023-49081Medium< 3.9.03.8.5.post4+tuxcare
CVE-2023-47627High< 3.8.63.8.1.post1+tuxcare
CVE-2023-47627High< 3.8.63.8.5.post1+tuxcare
CVE-2023-37276High< 3.8.53.8.1.post5+tuxcare
CVE-2023-37276High< 3.8.53.8.4.post1+tuxcare
GHSA-pjjw-qhg8-p2p9High< 3.8.63.8.1.post7+tuxcare

N/A (Not Available) means that the National Vulnerability Database (NVD) has registered this CVE, but an official CVSS severity score has not yet been assigned.

If you are interested in the TuxCare Endless Lifecycle Support, contact sales@tuxcare.com.