Package "python3.10-full"
  
    
    
        | Name: | python3.10-full | 
    
        | Description:
 | Python Interpreter with complete class library (version 3.10) | 
    
        | Latest version: | 3.10.12-1~22.04.11 | 
    
        | Release: | jammy (22.04) | 
    
        | Level: | updates | 
    
        | Repository: | universe | 
         
            | Head package: | python3.10 | 
    
   
  
  
 
Links
    Download "python3.10-full"
    
Other versions of "python3.10-full" in Jammy
    
Changelog
    
    
    
        
        
    
    
        |   python3.10 (3.10.12-1~22.04.11) jammy-security; urgency=medium   * SECURITY UPDATE: Regular expression denial of service.
- debian/patches/CVE-2025-6069.patch: Improve regex parsing in
 Lib/html/parser.py.
 - CVE-2025-6069
 * SECURITY UPDATE: Infinite loop when parsing tar archives.
 - debian/patches/CVE-2025-8194.patch: Raise exception when count < 0 in
 Lib/tarfile.py.
 - CVE-2025-8194
  -- Hlib Korzhynskyy <email address hidden>  Fri, 15 Aug 2025 12:02:43 -0230 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2025-6069 | The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplifie |  
                | CVE-2025-8194 | There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process |  | 
    
    
    
    
    
        
        
    
    
        |   python3.10 (3.10.12-1~22.04.10) jammy-security; urgency=medium   * SECURITY UPDATE: incorrect address list folding
- debian/patches/CVE-2025-1795-1.patch: don't encode list separators in
 Lib/email/_header_value_parser.py,
 Lib/test/test_email/test__header_value_parser.py.
 - debian/patches/CVE-2025-1795-2.patch: fix AttributeError in the email
 module in Lib/email/_header_value_parser.py,
 Lib/test/test_email/test__header_value_parser.py.
 - CVE-2025-1795
 * SECURITY UPDATE: DoS via bytes.decode with unicode_escape
 - debian/patches/CVE-2025-4516.patch: fix use-after-free in the
 unicode-escape decoder with an error handler in
 Include/cpython/bytesobject.h, Include/cpython/unicodeobject.h,
 Lib/test/test_codeccallbacks.py, Lib/test/test_codecs.py,
 Objects/bytesobject.c, Objects/unicodeobject.c,
 Parser/string_parser.c.
 - CVE-2025-4516
  -- Marc Deslauriers <email address hidden>  Tue, 27 May 2025 13:12:29 -0400 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2025-1795 | During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is a |  
                | CVE-2025-4516 | There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding |  | 
    
    
    
    
    
        
        
    
    
        |   python3.10 (3.10.12-1~22.04.9) jammy-security; urgency=medium   * SECURITY UPDATE: urlparse does not flag hostname with square brackets
as incorrect
 - debian/patches/CVE-2025-0938.patch: disallow square brackets in
 domain names for parsed URLs in Lib/test/test_urlparse.py,
 Lib/urllib/parse.py.
 - CVE-2025-0938
  -- Marc Deslauriers <email address hidden>  Tue, 04 Feb 2025 09:57:36 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2025-0938 | The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid ac |  | 
    
    
    
    
    
        
        
    
    
        |   python3.10 (3.10.12-1~22.04.8) jammy-security; urgency=medium   * SECURITY UPDATE: incorrect validation of bracketed hosts
- debian/patches/CVE-2024-11168.patch: add checks to ensure that
 bracketed hosts found by urlsplit are of IPv6 or IPvFuture format in
 Lib/urllib/parse.py, Lib/test/test_urlparse.py.
 - CVE-2024-11168
  -- Marc Deslauriers <email address hidden>  Fri, 17 Jan 2025 09:35:34 -0500 | 
    | Source diff to previous version | 
        
        | 
                
                | CVE-2024-11168 | The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This |  | 
    
    
    
    
    
        
        
    
    
        |   python3.10 (3.10.12-1~22.04.7) jammy-security; urgency=medium   * SECURITY UPDATE: incorrect quoting in venv module
- debian/patches/CVE-2024-9287.patch: quote template strings in venv
 activation scripts in Lib/test/test_venv.py, Lib/venv/__init__.py,
 Lib/venv/scripts/common/activate, Lib/venv/scripts/nt/activate.bat,
 Lib/venv/scripts/posix/activate.csh,
 Lib/venv/scripts/posix/activate.fish.
 - CVE-2024-9287
  -- Marc Deslauriers <email address hidden>  Wed, 06 Nov 2024 15:22:13 -0500 | 
    
        
        | 
                
                | CVE-2024-9287 | A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted pro |  | 
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates