UbuntuUpdates.org

Package "python2.7-examples"

Name: python2.7-examples

Description:

Examples for the Python language (v2.7)

Latest version: 2.7.18-1~20.04.4
Release: focal (20.04)
Level: updates
Repository: universe
Head package: python2.7

Links


Download "python2.7-examples"


Other versions of "python2.7-examples" in Focal

Repository Area Version
base universe 2.7.18~rc1-2
security universe 2.7.18-1~20.04.3

Changelog

Version: 2.7.18-1~20.04.4 2024-03-14 20:06:57 UTC

  python2.7 (2.7.18-1~20.04.4) focal; urgency=medium

  * Add d/p/add-optimization-flags-to-cflags.diff: Add optimization flags to
    cflags when compiling C modules. (LP: #2002043)

 -- Mitchell Dzurick <email address hidden> Wed, 31 Jan 2024 09:23:13 -0700

Source diff to previous version
2002043 Python extension modules get built using wrong compiler flags with python2

Version: 2.7.18-1~20.04.3 2022-07-14 15:06:36 UTC

  python2.7 (2.7.18-1~20.04.3) focal-security; urgency=medium

  * SECURITY UPDATE: Injection Attack
    - debian/patches/CVE-2015-20107.patch: Make mailcap refuse to match unsafe
      filenames/types/param in Lib/mailcap.py.
    - CVE-2015-20107

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 01 Jul 2022 09:27:04 -0300

Source diff to previous version
CVE-2015-20107 In Python (aka CPython) through 3.10.4, the mailcap module does not add escape characters into commands discovered in the system mailcap file. This m

Version: 2.7.18-1~20.04.1 2021-03-11 23:07:07 UTC

  python2.7 (2.7.18-1~20.04.1) focal-security; urgency=medium

  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2019-9674.patch: add pitfalls to
      zipfile module doc in Doc/library/zipfile.rst,
      Misc/NEWS.d/next/Documentation/2019-06-04-09-29-00.bpo-36260.WrGuc-.rst.
    - CVE-2019-9674
  * SECURITY UPDATE: Misleading information
    - debian/patches/CVE-2019-17514.patch: explain that the orderness of the
      of the result is system-dependant in Doc/library/glob.rst.
    - CVE-2019-17514
  * SECURITY UPDATE: Infinite loop
    - debian/patches/CVE-2019-20907.patch: avoid infinite loop in the
      tarfile module in Lib/tarfile.py, Lib/test/test_tarfile.py.
    - CVE-2019-20907
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2020-8492.patch: fix the regex to prevent
      the regex denial of service in Lib/urllib2.py.
    - CVE-2020-8492
  * SECURITY UPDATE: CRLF injection
    - debian/patches/CVE-2020-26116.patch: prevent header injection
      in http methods in Lib/httplib.py, Lib/test/test_httlib.py.
    - CVE-2020-26116
  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2021-3177.patch: use improved patch backport.
    - CVE-2021-3177

 -- Paulo Flabiano Smorigo <email address hidden> Mon, 08 Mar 2021 13:02:45 +0000

Source diff to previous version
CVE-2019-9674 Lib/zipfile.py in Python through 3.7.2 allows remote attackers to cause a denial of service (resource consumption) via a ZIP bomb.
CVE-2019-17514 library/glob.html in the Python 2 and 3 documentation before 2016 has potentially misleading information about whether sorting occurs, as demonstrate
CVE-2019-20907 In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, becaus
CVE-2020-8492 Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular E
CVE-2020-26116 http.client in Python 3.x before 3.5.10, 3.6.x before 3.6.12, 3.7.x before 3.7.9, and 3.8.x before 3.8.5 allows CRLF injection if the attacker contro
CVE-2021-3177 Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applic

Version: 2.7.18-1~20.04 2020-10-06 19:06:56 UTC

  python2.7 (2.7.18-1~20.04) focal; urgency=medium

  * SRU: LP: #1890272: Update to to the final 2.7.18 release.

 -- Matthias Klose <email address hidden> Tue, 04 Aug 2020 13:16:42 +0200

1890272 SRU: Update to the final python 2.7.18 release



About   -   Send Feedback to @ubuntu_updates