Release date:
2023-12-26 17:30:31 UTC
Description:
* SECURITY UPDATE: potential DoS attack via CPU and RAM exhaustion
- debian/patches/CVE-2022-48564.patch: Improve validation of Plist files
that prevent DoS when processing malformed Apple Property List files
in binary format
- CVE-2022-48564
* SECURITY UPDATE: TLS handshake bypass
- debian/patches/CVE-2023-40217.patch: Check for & avoid the ssl
pre-close flaw. Update SSL tests
- CVE-2023-40217
Updated packages:
-
idle-python3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
sha:df0a1f08cf9830ffa239c2aa7a8b1d8a986f3826
-
libpython3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:0f8a152e146769c5596797ac23b831b7ca306807
-
libpython3.5-dev_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:266c7bfbedbdee522a9fa68fe24588ac38afeda5
-
libpython3.5-minimal_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:7d9fd7652c5675f7d9fe3337027bb89b2a6425ae
-
libpython3.5-stdlib_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:73ae0194d94e7d5cf4af4fdefa1687aa7b2bb7aa
-
libpython3.5-testsuite_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
sha:8c09523311360cf4091509813703dad5f656851c
-
python3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:548a8d2f08f9da89c8a0be6efffe2e8f5222f0e2
-
python3.5-dev_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:70011a2a1f76f4c26b2948b45dcb5c6afb1f2d50
-
python3.5-doc_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
sha:2cbe4fc2cec5483c44995a825e32b51db4f3b343
-
python3.5-examples_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_all.deb
sha:071a1eca8b37000d23953ae97b2983c6aef16637
-
python3.5-minimal_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:6bfd3001774e830a0fef7831adb7661dc0a8851c
-
python3.5-venv_3.5.2-2ubuntu0~16.04.13+tuxcare.els13_amd64.deb
sha:4245785388cf4e845f62cf63fea89c664a18127e
Notes:
This page is generated automatically and has not been checked for errors. For clarification or
corrections please contact the
CloudLinux Packaging Team.