UbuntuUpdates.org

Package "libpython3.8-stdlib"

Name: libpython3.8-stdlib

Description:

Interactive high-level object-oriented language (standard library, version 3.8)

Latest version: 3.8.10-0ubuntu1~20.04.16
Release: focal (20.04)
Level: updates
Repository: main
Head package: python3.8

Links


Download "libpython3.8-stdlib"


Other versions of "libpython3.8-stdlib" in Focal

Repository Area Version
base main 3.8.2-1ubuntu1
security main 3.8.10-0ubuntu1~20.04.16

Changelog

Version: 3.8.10-0ubuntu1~20.04.16 2025-03-12 20:07:02 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.16) focal-security; urgency=medium

  * SECURITY UPDATE: incorrect quoting in venv module
    - debian/patches/CVE-2024-9287.patch: Updated to fix additional
      quotes in activation scripts Lib/venv/scripts/common/activate,
      Lib/venv/scripts/posix/activate.csh, and
      Lib/venv/scripts/posix/activate.fish.
    - CVE-2024-9287
  * SECURITY UPDATE: urlparse does not flag hostname with square brackets
    as incorrect
    - debian/patches/CVE-2025-0938-pre1.patch: Remove urlsplit()
      optimization for 'http' prefixed inputs.
    - debian/patches/CVE-2025-0938-pre2.patch: Fix urlparse() with numeric
      paths.
    - debian/patches/CVE-2025-0938.patch: Refreshed. It has together with
      the pre patches the intended effect now.
    - CVE-2025-0938

 -- Fabian Toepfer <email address hidden> Tue, 11 Mar 2025 18:45:31 +0100

Source diff to previous version
CVE-2024-9287 A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted pro
CVE-2025-0938 The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid ac

Version: 3.8.10-0ubuntu1~20.04.15 2025-02-21 02:06:55 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.15) focal-security; urgency=medium

  * SECURITY UPDATE: urlparse does not flag hostname with square brackets
    as incorrect
    - debian/patches/CVE-2025-0938.patch: disallow square brackets in
      domain names for parsed URLs in Lib/test/test_urlparse.py,
      Lib/urllib/parse.py.
    - CVE-2025-0938

 -- Marc Deslauriers <email address hidden> Tue, 04 Feb 2025 10:02:54 -0500

Source diff to previous version
CVE-2025-0938 The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid ac

Version: 3.8.10-0ubuntu1~20.04.14 2025-01-20 19:07:01 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.14) focal-security; urgency=medium

  * SECURITY UPDATE: incorrect validation of bracketed hosts
    - debian/patches/CVE-2024-11168.patch: add checks to ensure that
      bracketed hosts found by urlsplit are of IPv6 or IPvFuture format in
      Lib/urllib/parse.py, Lib/test/test_urlparse.py.
    - CVE-2024-11168

 -- Marc Deslauriers <email address hidden> Fri, 17 Jan 2025 09:40:23 -0500

Source diff to previous version
CVE-2024-11168 The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This

Version: 3.8.10-0ubuntu1~20.04.13 2024-11-19 18:06:51 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.13) focal-security; urgency=medium

  * SECURITY UPDATE: incorrect quoting in venv module
    - debian/patches/CVE-2024-9287.patch: quote template strings in venv
      activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,
      Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,
      Lib/venv/scripts/posix/activate.csh,
      Lib/venv/scripts/posix/activate.fish.
    - CVE-2024-9287

 -- Marc Deslauriers <email address hidden> Thu, 07 Nov 2024 08:10:47 -0500

Source diff to previous version
CVE-2024-9287 A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted pro

Version: 3.8.10-0ubuntu1~20.04.12 2024-09-16 16:06:55 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.12) focal-security; urgency=medium

  * SECURITY UPDATE: incorrect special character parsing in email module
    - debian/patches/CVE-2023-27043.patch: reject malformed addresses in
      Doc/library/email.utils.rst, Lib/email/utils.py,
      Lib/test/test_email/test_email.py.
    - CVE-2023-27043
  * SECURITY UPDATE: ReDoS via specifically-crafted tar archives
    - debian/patches/CVE-2024-6232.patch: remove backtracking when parsing
      tarfile headers in Lib/tarfile.py, Lib/test/test_tarfile.py.
    - CVE-2024-6232
  * SECURITY UPDATE: header injection via newlines in email module
    - debian/patches/CVE-2024-6923.patch: encode newlines in headers, and
      verify headers are sound in Doc/library/email.errors.rst,
      Doc/library/email.policy.rst, Lib/email/_header_value_parser.py,
      Lib/email/_policybase.py, Lib/email/errors.py,
      Lib/email/generator.py, Lib/test/test_email/test_generator.py,
      Lib/test/test_email/test_policy.py.
    - CVE-2024-6923
  * SECURITY UPDATE: resource consumption via cookie parsing
    - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in
      parsing quoted cookie values with backslashes in Lib/http/cookies.py,
      Lib/test/test_http_cookies.py.
    - CVE-2024-7592
  * SECURITY UPDATE: infinite loop via crafted zip archive
    - debian/patches/CVE-2024-8088.patch: sanitize names in zipfile.Path in
      Lib/test/test_zipfile/_path/test_path.py,
      Lib/zipfile/_path/__init__.py.
    - CVE-2024-8088

 -- Marc Deslauriers <email address hidden> Wed, 11 Sep 2024 12:02:53 -0400

CVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 heade
CVE-2024-6232 There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile heade
CVE-2024-6923 There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an
CVE-2024-7592 There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contain
CVE-2024-8088 There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFil



About   -   Send Feedback to @ubuntu_updates