Package "libpython3.10-stdlib"

Name: libpython3.10-stdlib


Interactive high-level object-oriented language (standard library, version 3.10)

Latest version: 3.10.7-1ubuntu0.3
Release: kinetic (22.10)
Level: updates
Repository: main
Head package: python3.10


Download "libpython3.10-stdlib"

Other versions of "libpython3.10-stdlib" in Kinetic

Repository Area Version
base main 3.10.7-1
security main 3.10.7-1ubuntu0.3


Version: 3.10.7-1ubuntu0.3 2023-03-20 13:06:58 UTC

  python3.10 (3.10.7-1ubuntu0.3) kinetic-security; urgency=medium

  * SECURITY UPDATE: Possible Bypass Blocklisting
    - debian/patches/CVE-2023-24329.patch: enforce
      that a scheme must begin with an alphabetical ASCII character
      in Lib/urllib/parse.py, Lib/test/test_urlparse.py.
    - CVE-2023-24329

 -- Leonidas Da Silva Barbosa <email address hidden> Fri, 10 Mar 2023 07:47:39 -0300

Source diff to previous version
CVE-2023-24329 An issue in the urllib.parse component of Python before v3.11 allows attackers to bypass blocklisting methods by supplying a URL that starts with bla

Version: 3.10.7-1ubuntu0.2 2022-12-08 17:06:45 UTC

  python3.10 (3.10.7-1ubuntu0.2) kinetic-security; urgency=medium

  * SECURITY UPDATE: Buffer overflow
    - debian/patches/CVE-2022-37454.patch: fixes buffer overflow in
      Modules/_sha3/kcp/KeccakSponge.inc (LP: #1995197).
    - CVE-2022-37454
  * SECURITY UPDATE: Denial of service
    - debian/patches/CVE-2022-45061.patch: fix quadratic time idna decoding
      in Lib/encodings/idna.py, Lib/test/test_codecs.py.
    - CVE-2022-45061

 -- Leonidas Da Silva Barbosa <email address hidden> Thu, 24 Nov 2022 16:45:47 -0300

Source diff to previous version
CVE-2022-37454 The Keccak XKCP SHA-3 reference implementation before fdc6fef has an integer overflow and resultant buffer overflow that allows attackers to execute
CVE-2022-45061 An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3

Version: 3.10.7-1ubuntu0.1 2022-11-03 14:07:21 UTC

  python3.10 (3.10.7-1ubuntu0.1) kinetic-security; urgency=medium

  * SECURITY UPDATE: privilege escalation via multiprocessing forkserver
    start method
    - debian/patches/CVE-2022-42919.patch: don't use Linux abstract sockets
      in Lib/multiprocessing/connection.py.
    - CVE-2022-42919

 -- Marc Deslauriers <email address hidden> Wed, 02 Nov 2022 14:49:29 -0400

CVE-2022-42919 Linux specific local privilege escalation via the multiprocessing forkserver start method

About   -   Send Feedback to @ubuntu_updates