Branches for Lucid

Name Status Last Modified Last Commit
lp:ubuntu/lucid-proposed/python3.1 bug 2 Mature 2010-09-27 10:48:37 UTC
14. * Assume working semaphores, don't re...

Author: Matthias Klose
Revision Date: 2010-09-20 14:31:19 UTC

* Assume working semaphores, don't rely on running kernel for the check.
  LP: #630511.
* Disable test_threading test on powerpc, which fail on the buildds.

lp:ubuntu/lucid-security/python3.1 2 Mature 2012-10-23 09:34:32 UTC
15. * SECURITY UPDATE: optionally disallo...

Author: Jamie Strandboge
Revision Date: 2012-10-23 09:34:32 UTC

* SECURITY UPDATE: optionally disallow setting sys.path when setting
  sys.argv
  - debian/patches/CVE-2008-5983.dpatch: add new C API function,
    PySys_SetArgvEx
  - CVE-2008-5983
* SECURITY UPDATE: fix integer overflows in audioop module
  - debian/patches/CVE-2010-1634.dpatch: Fix incorrect and UB-inducing
    overflow checks
  - CVE-2010-1634
* SECURITY UPDATE: fix DoS in audioop module
  - debian/patches/CVE-2010-2089.dpatch: ensure that the input string length
    is a multiple of the frame size
  - CVE-2010-2089
* SECURE UPDATE: http://bugs.python.org/issue13512
  - debian/patches/CVE-2011-4944.dpatch: create ~/.pypirc securely
  - CVE-2011-4944
* SECURITY UPDATE: xmlrpc: Fix an endless loop in SimpleXMLRPCServer upon
  malformed POST request
  - debian/patches/CVE-2012-0845.dpatch: break if don't receive EOF in
    Lib/SimpleXMLRPCServer.py
  - CVE-2012-0845
* SECURITY UPDATE: fix hash randomization DoS
  - debian/patches/CVE-2012-1150.dpatch: add -R command-line option and
    PYTHONHASHSEED environment variable, to provide an opt-in way to protect
    against denial of service attacks due to hash collisions within the dict
    and set types.
  - CVE-2012-1150
* SECURITY UPDATE: http://bugs.python.org/issue14579
  - debian/patches/CVE-2012-2135.dpatch: fix vulnerability in the utf-16
    decoder after error handling
  - CVE-2012-2135

lp:ubuntu/lucid-updates/python3.1 2 Mature 2012-10-23 09:34:32 UTC
15. * SECURITY UPDATE: optionally disallo...

Author: Jamie Strandboge
Revision Date: 2012-10-23 09:34:32 UTC

* SECURITY UPDATE: optionally disallow setting sys.path when setting
  sys.argv
  - debian/patches/CVE-2008-5983.dpatch: add new C API function,
    PySys_SetArgvEx
  - CVE-2008-5983
* SECURITY UPDATE: fix integer overflows in audioop module
  - debian/patches/CVE-2010-1634.dpatch: Fix incorrect and UB-inducing
    overflow checks
  - CVE-2010-1634
* SECURITY UPDATE: fix DoS in audioop module
  - debian/patches/CVE-2010-2089.dpatch: ensure that the input string length
    is a multiple of the frame size
  - CVE-2010-2089
* SECURE UPDATE: http://bugs.python.org/issue13512
  - debian/patches/CVE-2011-4944.dpatch: create ~/.pypirc securely
  - CVE-2011-4944
* SECURITY UPDATE: xmlrpc: Fix an endless loop in SimpleXMLRPCServer upon
  malformed POST request
  - debian/patches/CVE-2012-0845.dpatch: break if don't receive EOF in
    Lib/SimpleXMLRPCServer.py
  - CVE-2012-0845
* SECURITY UPDATE: fix hash randomization DoS
  - debian/patches/CVE-2012-1150.dpatch: add -R command-line option and
    PYTHONHASHSEED environment variable, to provide an opt-in way to protect
    against denial of service attacks due to hash collisions within the dict
    and set types.
  - CVE-2012-1150
* SECURITY UPDATE: http://bugs.python.org/issue14579
  - debian/patches/CVE-2012-2135.dpatch: fix vulnerability in the utf-16
    decoder after error handling
  - CVE-2012-2135

lp:~statik/ubuntu/lucid/python3.1/unladen-swallow 1 Development 2010-02-24 22:08:47 UTC This branch has not been pushed to yet.
lp:ubuntu/lucid/python3.1 bug 1 Development 2010-04-15 01:23:14 UTC
13. * Overwrite the sem_open autoconf che...

Author: Matthias Klose
Revision Date: 2010-04-14 23:54:59 UTC

* Overwrite the sem_open autoconf check, depending on a newer
  kernel version not available on the buildd. LP: #556477.
* debian/patches/issue8032.dpatch: Update to version from the
  trunk. Upload for beta2 to avoid apport errors.
  - Handle PyFrameObject's: LP: #543624, #548723.
  - Detect cycles in object reference graph and add extra
    protection: LP: #544823, LP: #552356.

15 of 5 results