UbuntuUpdates.org

Package "python3.10-full"

Name: python3.10-full

Description:

Python Interpreter with complete class library (version 3.10)

Latest version: 3.10.12-1~22.04.7
Release: jammy (22.04)
Level: security
Repository: universe
Head package: python3.10

Links


Download "python3.10-full"


Other versions of "python3.10-full" in Jammy

Repository Area Version
base universe 3.10.4-3
updates universe 3.10.12-1~22.04.7

Changelog

Version: 3.10.12-1~22.04.2 2023-07-31 15:07:48 UTC

  python3.10 (3.10.12-1~22.04.2) jammy-proposed; urgency=medium

  * SRU: LP: #1995504: Backport the 3.10.12 release to 22.04 LTS.
  * Revert:
    - autopkgtests: Support python3-setuptools >= 64, which does PEP-660
      editable installs.

Source diff to previous version
1995504 SRU: update python3.10 to the 3.10.8 release in 22.04 LTS and 22.10

Version: 3.10.6-1~22.04.2ubuntu1.1 2023-06-05 19:07:08 UTC

  python3.10 (3.10.6-1~22.04.2ubuntu1.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329-2.patch: adds a complementary patch/fix
      for CVE-2023-24329 that was partially fixed before. This patch starts
      stripping C0 control and space chars in 'urlsplit' in Lib/urllib/parse.py,
      Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 29 May 2023 08:10:38 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.6-1~22.04.2ubuntu1 2023-03-20 12:07:00 UTC

  python3.10 (3.10.6-1~22.04.2ubuntu1) jammy-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329.patch: enforce
      that a scheme must begin with an alphabetical ASCII character
      in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 10 Mar 2023 07:55:28 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.6-1~22.04.2 2022-12-08 16:06:30 UTC

  python3.10 (3.10.6-1~22.04.2) jammy-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2022-37454.patch: fixes buffer overflow in
      Modules/_sha3/kcp/KeccakSponge.inc (LP: #1995197).
    - CVE-2022-37454
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
      in Lib/encodings/idna.py, Lib/test/test_codecs.py.
    - CVE-2022-45061

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 14 Nov 2022 13:10:14 -0300

Source diff to previous version
CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute
CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3

Version: 3.10.6-1~22.04.1 2022-11-03 14:07:20 UTC

  python3.10 (3.10.6-1~22.04.1) jammy-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via multiprocessing forkserver
    start method
    - debian/patches/CVE-2022-42919.patch: don't use Linux abstract sockets
      in Lib/multiprocessing/connection.py.
    - CVE-2022-42919

 -- Marc Deslauriers <email address hidden> Wed, 02 Nov 2022 14:53:38 -0400

CVE-2022-42919 Linux specific local privilege escalation via the multiprocessing forkserver start method



About   -   Send Feedback to @ubuntu_updates