Package "python3.10-full"
Name: |
python3.10-full
|
Description: |
Python Interpreter with complete class library (version 3.10)
|
Latest version: |
3.10.12-1~22.04.11 |
Release: |
jammy (22.04) |
Level: |
updates |
Repository: |
universe |
Head package: |
python3.10 |
Links
Download "python3.10-full"
Other versions of "python3.10-full" in Jammy
Changelog
python3.10 (3.10.12-1~22.04.11) jammy-security; urgency=medium
* SECURITY UPDATE: Regular expression denial of service.
- debian/patches/CVE-2025-6069.patch: Improve regex parsing in
Lib/html/parser.py.
- CVE-2025-6069
* SECURITY UPDATE: Infinite loop when parsing tar archives.
- debian/patches/CVE-2025-8194.patch: Raise exception when count < 0 in
Lib/tarfile.py.
- CVE-2025-8194
-- Hlib Korzhynskyy <email address hidden> Fri, 15 Aug 2025 12:02:43 -0230
|
Source diff to previous version |
CVE-2025-6069 |
The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplifie |
CVE-2025-8194 |
There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process |
|
python3.10 (3.10.12-1~22.04.10) jammy-security; urgency=medium
* SECURITY UPDATE: incorrect address list folding
- debian/patches/CVE-2025-1795-1.patch: don't encode list separators in
Lib/email/_header_value_parser.py,
Lib/test/test_email/test__header_value_parser.py.
- debian/patches/CVE-2025-1795-2.patch: fix AttributeError in the email
module in Lib/email/_header_value_parser.py,
Lib/test/test_email/test__header_value_parser.py.
- CVE-2025-1795
* SECURITY UPDATE: DoS via bytes.decode with unicode_escape
- debian/patches/CVE-2025-4516.patch: fix use-after-free in the
unicode-escape decoder with an error handler in
Include/cpython/bytesobject.h, Include/cpython/unicodeobject.h,
Lib/test/test_codeccallbacks.py, Lib/test/test_codecs.py,
Objects/bytesobject.c, Objects/unicodeobject.c,
Parser/string_parser.c.
- CVE-2025-4516
-- Marc Deslauriers <email address hidden> Tue, 27 May 2025 13:12:29 -0400
|
Source diff to previous version |
CVE-2025-1795 |
During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is a |
CVE-2025-4516 |
There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding |
|
python3.10 (3.10.12-1~22.04.9) jammy-security; urgency=medium
* SECURITY UPDATE: urlparse does not flag hostname with square brackets
as incorrect
- debian/patches/CVE-2025-0938.patch: disallow square brackets in
domain names for parsed URLs in Lib/test/test_urlparse.py,
Lib/urllib/parse.py.
- CVE-2025-0938
-- Marc Deslauriers <email address hidden> Tue, 04 Feb 2025 09:57:36 -0500
|
Source diff to previous version |
CVE-2025-0938 |
The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid ac |
|
python3.10 (3.10.12-1~22.04.8) jammy-security; urgency=medium
* SECURITY UPDATE: incorrect validation of bracketed hosts
- debian/patches/CVE-2024-11168.patch: add checks to ensure that
bracketed hosts found by urlsplit are of IPv6 or IPvFuture format in
Lib/urllib/parse.py, Lib/test/test_urlparse.py.
- CVE-2024-11168
-- Marc Deslauriers <email address hidden> Fri, 17 Jan 2025 09:35:34 -0500
|
Source diff to previous version |
CVE-2024-11168 |
The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This |
|
python3.10 (3.10.12-1~22.04.7) jammy-security; urgency=medium
* SECURITY UPDATE: incorrect quoting in venv module
- debian/patches/CVE-2024-9287.patch: quote template strings in venv
activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,
Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,
Lib/venv/scripts/posix/activate.csh,
Lib/venv/scripts/posix/activate.fish.
- CVE-2024-9287
-- Marc Deslauriers <email address hidden> Wed, 06 Nov 2024 15:22:13 -0500
|
CVE-2024-9287 |
A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted pro |
|
About
-
Send Feedback to @ubuntu_updates