[CLSA-2023:1703611827] Fix CVE(s): CVE-2022-48564, CVE-2023-40217
Type:
security
Severity:
Moderate
Release date:
2023-12-26 17:30:31 UTC
Description:
* SECURITY UPDATE: potential DoS attack via CPU and RAM exhaustion - debian/patches/CVE-2022-48564.patch: Improve validation of Plist files that prevent DoS when processing malformed Apple Property List files in binary format - CVE-2022-48564 * SECURITY UPDATE: TLS handshake bypass - debian/patches/CVE-2023-40217.patch: Check for & avoid the ssl pre-close flaw. Update SSL tests - CVE-2023-40217
Updated packages:
  • idle-python3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
    sha:df0a1f08cf9830ffa239c2aa7a8b1d8a986f3826
  • libpython3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:0f8a152e146769c5596797ac23b831b7ca306807
  • libpython3.5-dev_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:266c7bfbedbdee522a9fa68fe24588ac38afeda5
  • libpython3.5-minimal_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:7d9fd7652c5675f7d9fe3337027bb89b2a6425ae
  • libpython3.5-stdlib_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:73ae0194d94e7d5cf4af4fdefa1687aa7b2bb7aa
  • libpython3.5-testsuite_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
    sha:8c09523311360cf4091509813703dad5f656851c
  • python3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:548a8d2f08f9da89c8a0be6efffe2e8f5222f0e2
  • python3.5-dev_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:70011a2a1f76f4c26b2948b45dcb5c6afb1f2d50
  • python3.5-doc_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
    sha:2cbe4fc2cec5483c44995a825e32b51db4f3b343
  • python3.5-examples_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
    sha:071a1eca8b37000d23953ae97b2983c6aef16637
  • python3.5-minimal_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:6bfd3001774e830a0fef7831adb7661dc0a8851c
  • python3.5-venv_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
    sha:4245785388cf4e845f62cf63fea89c664a18127e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.