UbuntuUpdates.org

Package "libpython3.12-stdlib"

Name: libpython3.12-stdlib

Description:

Interactive high-level object-oriented language (standard library, version 3.12)

Latest version: 3.12.3-1ubuntu0.3
Release: noble (24.04)
Level: security
Repository: main
Head package: python3.12

Links


Download "libpython3.12-stdlib"


Other versions of "libpython3.12-stdlib" in Noble

Repository Area Version
base main 3.12.3-1
updates main 3.12.3-1ubuntu0.3

Changelog

Version: 3.12.3-1ubuntu0.3 2024-11-19 15:07:22 UTC

  python3.12 (3.12.3-1ubuntu0.3) noble-security; urgency=medium

  * SECURITY UPDATE: incorrect quoting in venv module
    - debian/patches/CVE-2024-9287.patch: quote template strings in venv
      activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,
      Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,
      Lib/venv/scripts/posix/activate.csh,
      Lib/venv/scripts/posix/activate.fish.
    - CVE-2024-9287

 -- Marc Deslauriers <email address hidden> Wed, 06 Nov 2024 13:32:19 -0500

Source diff to previous version
CVE-2024-9287 A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted pro

Version: 3.12.3-1ubuntu0.2 2024-09-16 15:07:09 UTC

  python3.12 (3.12.3-1ubuntu0.2) noble-security; urgency=medium

  * SECURITY UPDATE: incorrect special character parsing in email module
    - debian/patches/CVE-2023-27043.patch: reject malformed addresses in
      Doc/library/email.utils.rst, Lib/email/utils.py,
      Lib/test/test_email/test_email.py.
    - CVE-2023-27043
  * SECURITY UPDATE: ReDoS via specifically-crafted tar archives
    - debian/patches/CVE-2024-6232.patch: remove backtracking when parsing
      tarfile headers in Lib/tarfile.py, Lib/test/test_tarfile.py.
    - CVE-2024-6232
  * SECURITY UPDATE: header injection via newlines in email module
    - debian/patches/CVE-2024-6923.patch: encode newlines in headers, and
      verify headers are sound in Doc/library/email.errors.rst,
      Doc/library/email.policy.rst, Lib/email/_header_value_parser.py,
      Lib/email/_policybase.py, Lib/email/errors.py,
      Lib/email/generator.py, Lib/test/test_email/test_generator.py,
      Lib/test/test_email/test_policy.py.
    - CVE-2024-6923
  * SECURITY UPDATE: resource consumption via cookie parsing
    - debian/patches/CVE-2024-7592.patch: fix quadratic complexity in
      parsing quoted cookie values with backslashes in Lib/http/cookies.py,
      Lib/test/test_http_cookies.py.
    - CVE-2024-7592
  * SECURITY UPDATE: infinite loop via crafted zip archive
    - debian/patches/CVE-2024-8088-1.patch: sanitize names in zipfile.Path
      in Lib/test/test_zipfile/_path/test_path.py,
      Lib/zipfile/_path/__init__.py.
    - debian/patches/CVE-2024-8088-2.patch: replaced SanitizedNames with a
      more surgical fix in Lib/test/test_zipfile/_path/test_path.py,
      Lib/zipfile/_path/__init__.py.
    - CVE-2024-8088

 -- Marc Deslauriers <email address hidden> Wed, 11 Sep 2024 10:17:37 -0400

Source diff to previous version
CVE-2023-27043 The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 heade
CVE-2024-6232 There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile heade
CVE-2024-6923 There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an
CVE-2024-7592 There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contain
CVE-2024-8088 There is a HIGH severity vulnerability affecting the CPython "zipfile" module affecting "zipfile.Path". Note that the more common API "zipfile.ZipFil

Version: 3.12.3-1ubuntu0.1 2024-08-01 13:07:01 UTC

  python3.12 (3.12.3-1ubuntu0.1) noble-security; urgency=medium

  * SECURITY UPDATE: is_private and is_global mismatch
    - debian/patches/CVE-2024-4032.patch: fix "private" (non-global) IP
      address ranges in Doc/library/ipaddress.rst, Lib/ipaddress.py,
      Lib/test/test_ipaddress.py.
    - CVE-2024-4032

 -- Marc Deslauriers <email address hidden> Wed, 31 Jul 2024 13:43:48 -0400

CVE-2024-4032 The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “priv



About   -   Send Feedback to @ubuntu_updates