UbuntuUpdates.org

Package "libpython3.10-dbg"

Name: libpython3.10-dbg

Description:

Debug Build of the Python Interpreter (version 3.10)

Latest version: 3.10.12-1~22.04.7
Release: jammy (22.04)
Level: updates
Repository: main
Head package: python3.10

Links


Download "libpython3.10-dbg"


Other versions of "libpython3.10-dbg" in Jammy

Repository Area Version
base main 3.10.4-3
security main 3.10.12-1~22.04.7

Changelog

Version: 3.10.12-1~22.04.7 2024-11-19 18:06:54 UTC

  python3.10 (3.10.12-1~22.04.7) jammy-security; urgency=medium

  * SECURITY UPDATE: incorrect quoting in venv module
    - debian/patches/CVE-2024-9287.patch: quote template strings in venv
      activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,
      Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,
      Lib/venv/scripts/posix/activate.csh,
      Lib/venv/scripts/posix/activate.fish.
    - CVE-2024-9287

 -- Marc Deslauriers <email address hidden> Wed, 06 Nov 2024 15:22:13 -0500

Source diff to previous version
CVE-2024-9287 A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted pro

Version: 3.10.12-1~22.04.6 2024-09-16 16:06:58 UTC

  python3.10 (3.10.12-1~22.04.6) jammy-security; urgency=medium

  * SECURITY UPDATE: incorrect special character parsing in email module
    - debian/patches/CVE-2023-27043.patch: reject malformed addresses in
      Doc/library/email.utils.rst, Lib/email/utils.py,
      Lib/test/test_email/test_email.py.
    - CVE-2023-27043
  * SECURITY UPDATE: ReDoS via specifically-crafted tar archives
    - debian/patches/CVE-2024-6232.patch: remove backtracking when parsing
      tarfile headers in Lib/tarfile.py, Lib/test/test_tarfile.py.
    - CVE-2024-6232
  * SECURITY UPDATE: header injection via newlines in email module
    - debian/patches/CVE-2024-6923.patch: encode newlines in headers, and
      verify headers are sound in Doc/library/email.errors.rst,
      Doc/library/email.policy.rst, Lib/email/_header_value_parser.py,
      Lib/email/_policybase.py, Lib/email/errors.py,
      Lib/email/generator.py, Lib/test/test_email/test_generator.py,
      Lib/test/test_email/test_policy.py.
    - CVE-2024-6923
  * SECURITY UPDATE: resource consumption via cookie parsing
    - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in
      parsing quoted cookie values with backslashes in Lib/http/cookies.py,
      Lib/test/test_http_cookies.py.
    - CVE-2024-7592
  * SECURITY UPDATE: infinite loop via crafted zip archive
    - debian/patches/CVE-2024-8088-1.patch: sanitize names in zipfile.Path
      in Lib/test/test_zipfile/_path/test_path.py,
      Lib/zipfile/_path/__init__.py.
    - debian/patches/CVE-2024-8088-2.patch: replaced SanitizedNames with a
      more surgical fix in Lib/test/test_zipfile/_path/test_path.py,
      Lib/zipfile/_path/__init__.py.
    - CVE-2024-8088

 -- Marc Deslauriers <email address hidden> Wed, 11 Sep 2024 11:47:36 -0400

Source diff to previous version
CVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 heade
CVE-2024-6232 There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile heade
CVE-2024-6923 There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an
CVE-2024-7592 There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contain
CVE-2024-8088 There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFil

Version: 3.10.12-1~22.04.5 2024-07-30 17:07:09 UTC

  python3.10 (3.10.12-1~22.04.5) jammy-security; urgency=medium

  * SECURITY UPDATE: race condition in ssl.SSLContext methods
    - debian/patches/CVE-2024-0397.patch: fix locking in cert_store_stats
      and get_ca_certs in Modules/_ssl.c.
    - CVE-2024-0397
  * SECURITY UPDATE: is_private and is_global mismatch
    - debian/patches/CVE-2024-4032.patch: fix "private" (non-global) IP
      address ranges in Doc/library/ipaddress.rst, Lib/ipaddress.py,
      Lib/test/test_ipaddress.py.
    - CVE-2024-4032

 -- Marc Deslauriers <email address hidden> Mon, 29 Jul 2024 12:56:48 -0400

Source diff to previous version
CVE-2024-0397 A defect was discovered in the Python “ssl” module where there is a memory race condition with the ssl.SSLContext methods “cert_store_stats()” and “g
CVE-2024-4032 The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “priv

Version: 3.10.12-1~22.04.4 2024-07-09 18:07:22 UTC

  python3.10 (3.10.12-1~22.04.4) jammy-security; urgency=medium

  * SECURITY UPDATE: incorrect permission assignment
    - debian/patches/CVE-2023-6597.patch: fix symlink bug in cleanup.
    - CVE-2023-6597
  * SECURITY UPDATE: zipbomb DoS attack
    - debian/patches/CVE-2024-0450.patch: raise BadZipFile when trying
      to read an entry that overlaps with other entry or central
      directory.
    - CVE-2024-0450

 -- Allen Huang <email address hidden> Fri, 22 Mar 2024 16:50:05 +0000

Source diff to previous version
CVE-2023-6597 An issue was found in the CPython `tempfile.TemporaryDirectory` class affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The
CVE-2024-0450 An issue was found in the CPython `zipfile` module affecting versions 3.12.1, 3.11.7, 3.10.13, 3.9.18, and 3.8.18 and prior. The zipfile module is v

Version: 3.10.12-1~22.04.3 2023-11-27 22:06:57 UTC

  python3.10 (3.10.12-1~22.04.3) jammy-security; urgency=medium

  * SECURITY UPDATE: TLS handshake bypass
    - debian/patches/CVE-2023-40217.patch: avoid ssl pre-close flaw in ssl.py.
    - CVE-2023-40217

 -- Fabian Toepfer <email address hidden> Mon, 20 Nov 2023 16:14:05 +0100

CVE-2023-40217 An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (



About   -   Send Feedback to @ubuntu_updates