From: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com> Date: Mon, 13 Mar 2023 23:26:42 +0000 (-0700) Subject: [3.7] gh-102627: Replace address pointing toward malicious web page (GH-102630) ... X-Git-Tag: v3.7.17~10 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=00d1d3278448503bec6f28527b707d301e937756;p=thirdparty%2FPython%2Fcpython.git [3.7] gh-102627: Replace address pointing toward malicious web page (GH-102630) (GH-102668) (cherry picked from commit 61479d46848bc7a7f9b571b0b09c4a4b4436d839) Co-authored-by: Blind4Basics <32236948+Blind4Basics@users.noreply.github.com> Co-authored-by: C.A.M. Gerlach Co-authored-by: Hugo van Kemenade --- diff --git a/Doc/library/concurrent.futures.rst b/Doc/library/concurrent.futures.rst index 9295df84278d..e0ec27f00271 100644 --- a/Doc/library/concurrent.futures.rst +++ b/Doc/library/concurrent.futures.rst @@ -173,7 +173,7 @@ ThreadPoolExecutor Example 'http://www.cnn.com/', 'http://europe.wsj.com/', 'http://www.bbc.co.uk/', - 'http://some-made-up-domain.com/'] + 'http://nonexistant-subdomain.python.org/'] # Retrieve a single page and report the URL and contents def load_url(url, timeout):