UbuntuUpdates.org

Package "python3.8-examples"

Name: python3.8-examples

Description:

Examples for the Python language (v3.8)

Latest version: 3.8.10-0ubuntu1~20.04.11
Release: focal (20.04)
Level: security
Repository: main
Head package: python3.8

Links


Download "python3.8-examples"


Other versions of "python3.8-examples" in Focal

Repository Area Version
base main 3.8.2-1ubuntu1
updates main 3.8.10-0ubuntu1~20.04.11

Changelog

Version: 3.8.10-0ubuntu1~20.04.6 2022-12-08 16:06:26 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.6) focal-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2022-37454.patch: fixes buffer overflow in
      Modules/_sha3/kcp/KeccakSponge.inc.
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2022-45061.patch: fix quadratic time idna
      decoding in Lib/encodings/idna.py.

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 14 Nov 2022 09:59:47 -0300

Source diff to previous version
CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute
CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3

Version: 3.8.10-0ubuntu1~20.04.5 2022-07-14 15:06:33 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.5) focal-security; urgency=medium

  * SECURITY UPDATE: Injection Attack
    - debian/patches/CVE-2015-20107.patch: Make mailcap refuse to match unsafe
      filenames/types/param in Lib/mailcap.py, Lib/test/test_mailcap.py.
    - CVE-2015-20107

 -- Leonidas Da Silva Barbosa <email address hidden> Wed, 22 Jun 2022 17:18:18 -0300

Source diff to previous version
CVE-2015-20107 In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This m

Version: 3.8.10-0ubuntu1~20.04.4 2022-03-28 11:06:23 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.4) focal-security; urgency=medium

  * SECURITY UPDATE: Injection Attack
    - debian/patches/CVE-2022-0391.patch: sanitize urls in urllib.parse
      when it containing ASCII newline and tabs in
      Doc/library/urllib.parse.rst, Lib/test/test_urlparse.py,
      Lib/urllib/parse.py.
    - CVE-2022-0391
  * Skipping test_idle in riscv64 arch
    - debian/rules: adding test_idle to TEST_EXCLUDES in riscv64 arch due it
      hangs in build time.

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 15 Mar 2022 09:22:08 -0300

Source diff to previous version
CVE-2022-0391 A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into componen

Version: 3.8.10-0ubuntu1~20.04.2 2021-12-15 22:06:19 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: Denial of Service
     - debian/patches/CVE-2021-3737.patch: addresses the potential for the
       urllib http client to enter into an infinite loop and hang on a 100
       Continue response from a malicious server.
     - debian/patches/CVE-2021-3737_test-fix.patch: improves the regression
       test in Lib/test/test_httplib.py
     - CVE-2021-3737_test-fix.patch

 -- Ian Constantin <email address hidden> Fri, 26 Nov 2021 15:14:08 -0500

Source diff to previous version
CVE-2021-3737 client can enter an infinite loop on a 100 Continue response from the server

Version: 3.8.10-0ubuntu1~20.04.1 2021-10-04 15:06:25 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.1) focal-security; urgency=medium

  [ Marc Deslauriers ]
  * SECURITY UPDATE: improper handling of octal strings in ipaddress
    - debian/patches/CVE-2021-29921.patch: no longer tolerate leading zeros
      in IPv4 addresses in Lib/ipaddress.py, Lib/test/test_ipaddress.py.
    - CVE-2021-29921

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 28 Sep 2021 13:10:42 -0300

CVE-2021-29921 In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) all



About   -   Send Feedback to @ubuntu_updates