UbuntuUpdates.org

Package "python3.10"

Name: python3.10

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • IDE for Python (v3.10) using Tkinter
  • Testsuite for the Python standard library (v3.10)
  • Python Interpreter with complete class library (version 3.10)
  • Python interpreter linked without PIE (version 3.10)

Latest version: 3.10.12-1~22.04.3
Release: jammy (22.04)
Level: updates
Repository: universe

Links



Other versions of "python3.10" in Jammy

Repository Area Version
base main 3.10.4-3
base universe 3.10.4-3
security universe 3.10.12-1~22.04.3
security main 3.10.12-1~22.04.3
updates main 3.10.12-1~22.04.3

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.10.12-1~22.04.3 2023-11-28 12:18:03 UTC

  python3.10 (3.10.12-1~22.04.3) jammy-security; urgency=medium

  * SECURITY UPDATE: TLS handshake bypass
    - debian/patches/CVE-2023-40217.patch: avoid ssl pre-close flaw in ssl.py.
    - CVE-2023-40217

 -- Fabian Toepfer <email address hidden> Mon, 20 Nov 2023 16:14:05 +0100

Source diff to previous version
CVE-2023-40217 An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (

Version: 3.10.12-1~22.04.2 2023-07-31 15:08:08 UTC

  python3.10 (3.10.12-1~22.04.2) jammy-proposed; urgency=medium

  * SRU: LP: #1995504: Backport the 3.10.12 release to 22.04 LTS.
  * Revert:
    - autopkgtests: Support python3-setuptools >= 64, which does PEP-660
      editable installs.

Source diff to previous version
1995504 SRU: update python3.10 to the 3.10.8 release in 22.04 LTS and 22.10

Version: 3.10.6-1~22.04.2ubuntu1.1 2023-06-05 20:07:04 UTC

  python3.10 (3.10.6-1~22.04.2ubuntu1.1) jammy-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329-2.patch: adds a complementary patch/fix
      for CVE-2023-24329 that was partially fixed before. This patch starts
      stripping C0 control and space chars in 'urlsplit' in Lib/urllib/parse.py,
      Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 29 May 2023 08:10:38 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.6-1~22.04.2ubuntu1 2023-03-20 13:06:57 UTC

  python3.10 (3.10.6-1~22.04.2ubuntu1) jammy-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329.patch: enforce
      that a scheme must begin with an alphabetical ASCII character
      in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 10 Mar 2023 07:55:28 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.6-1~22.04.2 2022-12-08 17:06:44 UTC

  python3.10 (3.10.6-1~22.04.2) jammy-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2022-37454.patch: fixes buffer overflow in
      Modules/_sha3/kcp/KeccakSponge.inc (LP: #1995197).
    - CVE-2022-37454
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
      in Lib/encodings/idna.py, Lib/test/test_codecs.py.
    - CVE-2022-45061

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 14 Nov 2022 13:10:14 -0300

CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute
CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3



About   -   Send Feedback to @ubuntu_updates