Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 953493 - <dev-lang/python-{3.8.20_p7,3.9.22,3.10.17,3.11.12,3.12.10,3.13.3,3.14.0_alpha7}, dev-lang/pypy-{3.10.7.3.19_p2,3.11.7.3.19_p5}: multiple vulnerabilities
Summary: <dev-lang/python-{3.8.20_p7,3.9.22,3.10.17,3.11.12,3.12.10,3.13.3,3.14.0_alph...
Status: CONFIRMED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: A4 [glsa?]
Keywords:
Depends on: 953485 953486 953487 953488 953489 953490 953491 953492
Blocks:
  Show dependency tree
 
Reported: 2025-04-09 19:28 UTC by Michał Górny
Modified: 2025-04-15 15:10 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2025-04-09 19:28:31 UTC
From the changelogs:

3.9+
====
..

.. date: 2025-01-28-14-08-03
.. gh-issue: 105704
.. nonce: EnhHxu
.. section: Security

When using :func:`urllib.parse.urlsplit` and :func:`urllib.parse.urlparse`
host parsing would not reject domain names containing square brackets (``[``
and ``]``). Square brackets are only valid for IPv6 and IPvFuture hosts
according to `RFC 3986 Section 3.2.2
<https://www.rfc-editor.org/rfc/rfc3986#section-3.2.2>`__.

..

.. date: 2024-08-06-12-27-34
.. gh-issue: 121284
.. nonce: 8rwPxe
.. section: Security

Fix bug in the folding of rfc2047 encoded-words when flattening an email
message using a modern email policy. Previously when an encoded-word was too
long for a line, it would be decoded, split across lines, and re-encoded.
But commas and other special characters in the original text could be left
unencoded and unquoted. This could theoretically be used to spoof header
lines using a carefully constructed encoded-word if the resulting rendered
email was transmitted or re-parsed.

..

.. date: 2024-05-24-21-00-52
.. gh-issue: 119511
.. nonce: jKrXQ8
.. section: Security

Fix a potential denial of service in the :mod:`imaplib` module. When
connecting to a malicious server, it could cause an arbitrary amount of
memory to be allocated. On many systems this is harmless as unused virtual
memory is only a mapping, but if this hit a virtual address size limit it
could lead to a :exc:`MemoryError` or other process crash. On unusual
systems or builds where all allocated memory is touched and backed by actual
ram or storage it could've consumed resources doing so until similarly
crashing.


3.10+
=====
..

.. date: 2024-08-06-11-43-08
.. gh-issue: 80222
.. nonce: wfR4BU
.. section: Security

Fix bug in the folding of quoted strings when flattening an email message
using a modern email policy. Previously when a quoted string was folded so
that it spanned more than one line, the surrounding quotes and internal
escapes would be omitted. This could theoretically be used to spoof header
lines using a carefully constructed quoted string if the resulting rendered
email was transmitted or re-parsed.


3.12+
=====

..

.. date: 2024-11-28-20-29-21
.. gh-issue: 127371
.. nonce: PeEhUd
.. section: Security

Avoid unbounded buffering for
:meth:`!tempfile.SpooledTemporaryFile.writelines`. Previously, disk
spillover was only checked after the lines iterator had been exhausted. This
is now done after each line is written.
Comment 1 Michał Górny archtester Gentoo Infrastructure gentoo-dev Security 2025-04-14 17:58:07 UTC
cleanup done.