UbuntuUpdates.org

Package "python3.8"

Name: python3.8

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • IDE for Python (v3.8) using Tkinter
  • Testsuite for the Python standard library (v3.8)
  • Python Interpreter with complete class library (version 3.8)
  • Interactive high-level object-oriented language (pyvenv binary, version 3.8)

Latest version: 3.8.10-0ubuntu1~20.04.9
Release: focal (20.04)
Level: updates
Repository: universe

Links



Other versions of "python3.8" in Focal

Repository Area Version
base universe 3.8.2-1ubuntu1
base main 3.8.2-1ubuntu1
security universe 3.8.10-0ubuntu1~20.04.9
security main 3.8.10-0ubuntu1~20.04.9
updates main 3.8.10-0ubuntu1~20.04.9

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.8.10-0ubuntu1~20.04.4 2022-03-28 12:06:27 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.4) focal-security; urgency=medium

  * SECURITY UPDATE: Injection Attack
    - debian/patches/CVE-2022-0391.patch: sanitize urls in urllib.parse
      when it containing ASCII newline and tabs in
      Doc/library/urllib.parse.rst, Lib/test/test_urlparse.py,
      Lib/urllib/parse.py.
    - CVE-2022-0391
  * Skipping test_idle in riscv64 arch
    - debian/rules: adding test_idle to TEST_EXCLUDES in riscv64 arch due it
      hangs in build time.

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 15 Mar 2022 09:22:08 -0300

Source diff to previous version
CVE-2022-0391 A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into componen

Version: 3.8.10-0ubuntu1~20.04.2 2021-12-15 23:06:21 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.2) focal-security; urgency=medium

  * SECURITY UPDATE: Denial of Service
     - debian/patches/CVE-2021-3737.patch: addresses the potential for the
       urllib http client to enter into an infinite loop and hang on a 100
       Continue response from a malicious server.
     - debian/patches/CVE-2021-3737_test-fix.patch: improves the regression
       test in Lib/test/test_httplib.py
     - CVE-2021-3737_test-fix.patch

 -- Ian Constantin <email address hidden> Fri, 26 Nov 2021 15:14:08 -0500

Source diff to previous version
CVE-2021-3737 client can enter an infinite loop on a 100 Continue response from the server

Version: 3.8.10-0ubuntu1~20.04.1 2021-10-04 15:06:29 UTC

  python3.8 (3.8.10-0ubuntu1~20.04.1) focal-security; urgency=medium

  [ Marc Deslauriers ]
  * SECURITY UPDATE: improper handling of octal strings in ipaddress
    - debian/patches/CVE-2021-29921.patch: no longer tolerate leading zeros
      in IPv4 addresses in Lib/ipaddress.py, Lib/test/test_ipaddress.py.
    - CVE-2021-29921

 -- Leonidas Da Silva Barbosa <email address hidden> Tue, 28 Sep 2021 13:10:42 -0300

Source diff to previous version
CVE-2021-29921 In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) all

Version: 3.8.10-0ubuntu1~20.04 2021-06-30 15:06:30 UTC

  python3.8 (3.8.10-0ubuntu1~20.04) focal-proposed; urgency=medium

  * SRU: LP: #1928057. Backport Python 3.8.10 to 20.04 LTS.
  * Python 3.8.10 release.
  * Refresh patches.
  * Call python with -S when checking the minimal set of modules.
  * Try to detect whether python3-venv is missing (Stefano Rivera).
    Addresses: #977887.
  * Build a python3.8-full package.

Source diff to previous version
1928057 SRU: backport Python 3.8.10 to 20.04 LTS and 20.10

Version: 3.8.5-1~20.04.3 2021-06-01 13:06:28 UTC

  python3.8 (3.8.5-1~20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: improper handling of octal strings in ipaddress
    - debian/patches/CVE-2021-29921.patch: no longer tolerate leading zeros
      in IPv4 addresses in Lib/ipaddress.py, Lib/test/test_ipaddress.py.
    - CVE-2021-29921

 -- Marc Deslauriers <email address hidden> Thu, 27 May 2021 09:30:53 -0400

CVE-2021-29921 In Python before 3,9,5, the ipaddress library mishandles leading zero characters in the octets of an IP address string. This (in some situations) all



About   -   Send Feedback to @ubuntu_updates