[CLSA-2023:1701971140] Fix CVE(s): CVE-2022-48564, CVE-2023-40217
Type:
security
Severity:
Moderate
Release date:
2023-12-07 17:45:43 UTC
Description:
* SECURITY UPDATE: potential DoS attack via CPU and RAM exhaustion - debian/patches/CVE-2022-48564.patch: Improve validation of Plist files that prevent DoS when processing malformed Apple Property List files in binary format - CVE-2022-48564 * SECURITY UPDATE: TLS handshake bypass - debian/patches/CVE-2023-40217.patch: Check for & avoid the ssl pre-close flaw. Update SSL tests - CVE-2023-40217
Updated packages:
  • idle-python3.6_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_all.deb
    sha:c9ba3e974cbdb3e2388750f5bfe97f03fec8602e
  • libpython3.6_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:96fba0299ca73ecfce45b75459f10498097d575f
  • libpython3.6-dev_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:948b0433ad1b8eb52371d3a1241a6f487b4fdbb1
  • libpython3.6-minimal_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:acd243268de39490958004a05027c0665340c711
  • libpython3.6-stdlib_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:801e0dd72593f129c6a40ad395100f3abcdfeeae
  • libpython3.6-testsuite_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_all.deb
    sha:276df9593d76280793f854b8865f2b7b5bd0e698
  • python3.6_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:fb835b184d094d89bdf2fabfd2d51ecd134f9cf8
  • python3.6-dev_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:ebd925dbb1d84ac0809ef0aa8c6589285603e50d
  • python3.6-doc_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_all.deb
    sha:a468491e7af4b4d9b5580fc8254bde2144c68b92
  • python3.6-examples_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_all.deb
    sha:ccbef27c44dc7ed0288b1e0d86f4504e4c7c4a0a
  • python3.6-minimal_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:9629918e7991505604855f89eada83f364d0bf33
  • python3.6-venv_3.6.9-1~18.04ubuntu1.12+tuxcare.els6_amd64.deb
    sha:d8022a89347abd45285af29c0bd40ad67eae9316
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.