UbuntuUpdates.org

Package "libpython3.10-minimal"

Name: libpython3.10-minimal

Description:

Minimal subset of the Python language (version 3.10)

Latest version: 3.10.12-1~22.04.6
Release: jammy (22.04)
Level: updates
Repository: main
Head package: python3.10

Links


Download "libpython3.10-minimal"


Other versions of "libpython3.10-minimal" in Jammy

Repository Area Version
base main 3.10.4-3
security main 3.10.12-1~22.04.6

Changelog

Version: 3.10.6-1~22.04.2ubuntu1.1 2023-06-05 20:07:02 UTC

  python3.10 (3.10.6-1~22.04.2ubuntu1.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329-2.patch: adds a complementary patch/fix
      for CVE-2023-24329 that was partially fixed before. This patch starts
      stripping C0 control and space chars in 'urlsplit' in Lib/urllib/parse.py,
      Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 29 May 2023 08:10:38 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.6-1~22.04.2ubuntu1 2023-03-20 13:06:56 UTC

  python3.10 (3.10.6-1~22.04.2ubuntu1) jammy-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329.patch: enforce
      that a scheme must begin with an alphabetical ASCII character
      in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 10 Mar 2023 07:55:28 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.6-1~22.04.2 2022-12-08 17:06:43 UTC

  python3.10 (3.10.6-1~22.04.2) jammy-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2022-37454.patch: fixes buffer overflow in
      Modules/_sha3/kcp/KeccakSponge.inc (LP: #1995197).
    - CVE-2022-37454
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
      in Lib/encodings/idna.py, Lib/test/test_codecs.py.
    - CVE-2022-45061

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 14 Nov 2022 13:10:14 -0300

Source diff to previous version
CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute
CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3

Version: 3.10.6-1~22.04.1 2022-11-03 14:07:19 UTC

  python3.10 (3.10.6-1~22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via multiprocessing forkserver
    start method
    - debian/patches/CVE-2022-42919.patch: don't use Linux abstract sockets
      in Lib/multiprocessing/connection.py.
    - CVE-2022-42919

 -- Marc Deslauriers <email address hidden> Wed, 02 Nov 2022 14:53:38 -0400

Source diff to previous version
CVE-2022-42919 Linux specific local privilege escalation via the multiprocessing forkserver start method

Version: 3.10.6-1~22.04 2022-09-22 11:07:27 UTC

  python3.10 (3.10.6-1~22.04) jammy-proposed; urgency=medium

  * SRU: LP: #1982108: Backport 3.10.6 to 20.04 LTS.

1982108 SRU: update python3.10 to the 3.10.5 release in 22.04 LTS



About   -   Send Feedback to @ubuntu_updates