UbuntuUpdates.org

Package "libpython3.10-dbg"

Name: libpython3.10-dbg

Description:

Debug Build of the Python Interpreter (version 3.10)

Latest version: 3.10.7-1ubuntu0.4
Release: kinetic (22.10)
Level: security
Repository: main
Head package: python3.10

Links


Download "libpython3.10-dbg"


Other versions of "libpython3.10-dbg" in Kinetic

Repository Area Version
base main 3.10.7-1
updates main 3.10.7-1ubuntu0.4

Changelog

Version: 3.10.7-1ubuntu0.4 2023-06-05 19:07:09 UTC

  python3.10 (3.10.7-1ubuntu0.4) kinetic-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329-2.patch: adds a complementary patch/fix
      for CVE-2023-24329 that was partially fixed before. This patch starts
      stripping C0 control and space chars in 'urlsplit' in Lib/urllib/parse.py,
      Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Mon, 29 May 2023 10:51:48 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.7-1ubuntu0.3 2023-03-20 12:07:00 UTC

  python3.10 (3.10.7-1ubuntu0.3) kinetic-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329.patch: enforce
      that a scheme must begin with an alphabetical ASCII character
      in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 10 Mar 2023 07:47:39 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.7-1ubuntu0.2 2022-12-08 16:06:30 UTC

  python3.10 (3.10.7-1ubuntu0.2) kinetic-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2022-37454.patch: fixes buffer overflow in
      Modules/_sha3/kcp/KeccakSponge.inc (LP: #1995197).
    - CVE-2022-37454
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
      in Lib/encodings/idna.py, Lib/test/test_codecs.py.
    - CVE-2022-45061

 -- Leonidas Da Silva Barbosa <email address hidden> Thu, 24 Nov 2022 16:45:47 -0300

Source diff to previous version
CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute
CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3

Version: 3.10.7-1ubuntu0.1 2022-11-03 14:07:21 UTC

  python3.10 (3.10.7-1ubuntu0.1) kinetic-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via multiprocessing forkserver
    start method
    - debian/patches/CVE-2022-42919.patch: don't use Linux abstract sockets
      in Lib/multiprocessing/connection.py.
    - CVE-2022-42919

 -- Marc Deslauriers <email address hidden> Wed, 02 Nov 2022 14:49:29 -0400

CVE-2022-42919 Linux specific local privilege escalation via the multiprocessing forkserver start method



About   -   Send Feedback to @ubuntu_updates