[CLSA-2024:1729627400] Fix CVE(s): CVE-2023-27043
Type:
security
Severity:
Moderate
Release date:
2024-10-22 20:03:24 UTC
Description:
* SECURITY UPDATE: Incorrect parsing of email addresses containing special characters - debian/patches/CVE-2023-27043.patch: Fix email address parsing errors by adding optional 'strict' parameter to getaddresses() and parseaddr() functions - debian/patches/fix-urllib2-test.patch: Fix error in test_issue16464() by rewriting it with a local HTTP server instead of an external resource - CVE-2023-27043
Updated packages:
  • idle-python3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_all.deb
    sha:46118c356676ed3d7649e30b661fe786b9d0d3fb
  • libpython3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:ff7d6e7da7858d965d5eba1bf6f82bf0cee6ef13
  • libpython3.5-dev_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:26de22a7bafbde1a29452a862a47a6137fe59821
  • libpython3.5-minimal_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:c814a7868f58a0aabd5d1e38a8b7d228f7c81bfe
  • libpython3.5-stdlib_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:c9a3d280caa0bb06d99cae21463efe8cc828edb4
  • libpython3.5-testsuite_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_all.deb
    sha:fef76ad2ef943b92e2cccd4bfea2f7356975a504
  • python3.5_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:2f578737e3d4912bc69bb61d4624b51913c29052
  • python3.5-dev_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:89ef99a766e14be5819481232c8cbf263c5979a5
  • python3.5-doc_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_all.deb
    sha:ca63166563b03ea42e05f8019fbe9b7a581d77d2
  • python3.5-examples_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_all.deb
    sha:1c7adf9d010ec46b3d46337d3c0265be4abe0667
  • python3.5-minimal_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:20726f43bd2b7c57070dd050441ca8f7c952d449
  • python3.5-venv_3.5.2-2ubuntu0~16.04.13+tuxcare.els15_amd64.deb
    sha:dd1f651bd1ff0a71da07fa7dc88b92516d2bcd07
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.