-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2024-f750328c3b 2024-09-12 01:26:59.749323 -------------------------------------------------------------------------------- Name : python3.10 Product : Fedora 40 Version : 3.10.15 Release : 1.fc40 URL : https://www.python.org/ Summary : Version 3.10 of the Python interpreter Description : Python 3.10 is an accessible, high-level, dynamically typed, interpreted programming language, designed with an emphasis on code readability. It includes an extensive standard library, and has a vast ecosystem of third-party libraries. The python3.10 package provides the "python3.10" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3.10-libs package, which should be installed automatically along with python3.10. The remaining parts of the Python standard library are broken out into the python3.10-tkinter and python3.10-test packages, which may need to be installed separately. Documentation for Python is provided in the python3.10-docs package. Packages containing additional libraries for Python are generally named with the "python3.10-" prefix. -------------------------------------------------------------------------------- Update Information: This is a security release of Python 3.10 Note: The release you're looking at is Python 3.10.15, a security bugfix release for the legacy 3.10 series. Python 3.12 is now the latest feature release series of Python 3. Security content in this release gh-123067: Fix quadratic complexity in parsing "-quoted cookie values with backslashes by http.cookies. Fixes CVE-2024-7592. gh-113171: Fixed various false positives and false negatives in IPv4Address.is_private, IPv4Address.is_global, IPv6Address.is_private, IPv6Address.is_global. Fixes CVE-2024-4032. gh-67693: Fix urllib.parse.urlunparse() and urllib.parse.urlunsplit() for URIs with path starting with multiple slashes and no authority. Fixes CVE-2015-2104. gh-121957: Fixed missing audit events around interactive use of Python, now also properly firing for python -i, as well as for python -m asyncio. The event in question is cpython.run_stdin. gh-122133: Authenticate the socket connection for the socket.socketpair() fallback on platforms where AF_UNIX is not available like Windows. gh-121285: Remove backtracking from tarfile header parsing for hdrcharset, PAX, and GNU sparse headers. That's CVE-2024-6232. gh-114572: ssl.SSLContext.cert_store_stats() and ssl.SSLContext.get_ca_certs() now correctly lock access to the certificate store, when the ssl.SSLContext is shared across multiple threads. gh-102988: email.utils.getaddresses() and email.utils.parseaddr() now return ('', '') 2-tuples in more situations where invalid email addresses are encountered instead of potentially inaccurate values. Add optional strict parameter to these two functions: use strict=False to get the old behavior, accept malformed inputs. getattr(email.utils, 'supports_strict_parsing', False) can be use to check if the strict paramater is available. This improves the CVE-2023-27043 fix. gh-123270: Sanitize names in zipfile.Path to avoid infinite loops (gh-122905) without breaking contents using legitimate characters. That's CVE-2024-8088. gh-121650: email headers with embedded newlines are now quoted on output. The generator will now refuse to serialize (write) headers that are unsafely folded or delimited; see verify_generated_headers. That's CVE-2024-6923. gh-119690: Fixes data type confusion in audit events raised by _winapi.CreateFile and _winapi.CreateNamedPipe. gh-116773: Fix instances of <_overlapped.Overlapped object at 0xXXX> still has pending operation at deallocation, the process may crash. gh-112275: A deadlock involving pystate.c's HEAD_LOCK in posixmodule.c at fork is now fixed. -------------------------------------------------------------------------------- ChangeLog: * Mon Sep 9 2024 Tomáš HrnÄ?iar <thrnciar@xxxxxxxxxx> - 3.10.15-1 - Update to 3.10.15 * Tue Jul 23 2024 LumÃr Balhar <lbalhar@xxxxxxxxxx> - 3.10.14-4 - Require systemtap-sdt-devel for sys/sdt.h * Fri Jul 19 2024 Fedora Release Engineering <releng@xxxxxxxxxxxxxxxxx> - 3.10.14-3 - Rebuilt for https://fedoraproject.org/wiki/Fedora_41_Mass_Rebuild -------------------------------------------------------------------------------- References: [ 1 ] Bug #2293390 - CVE-2024-4032 python3.10: python: incorrect IPv4 and IPv6 private ranges [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2293390 [ 2 ] Bug #2303157 - CVE-2024-6923 python3.10: email module doesn't properly quotes newlines in email headers, allowing header injection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2303157 [ 3 ] Bug #2307459 - CVE-2024-8088 python3.10: From NVD collector [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2307459 [ 4 ] Bug #2310088 - CVE-2024-6232 python3.10: tarfile: ReDos via excessive backtracking while parsing header values [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2310088 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-f750328c3b' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------
-- _______________________________________________ package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue