Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.854773
Category:SuSE Local Security Checks
Title:openSUSE: Security Advisory for python310 (SUSE-SU-2022:2291-1)
Summary:The remote host is missing an update for the 'python310'; package(s) announced via the SUSE-SU-2022:2291-1 advisory.
Description:Summary:
The remote host is missing an update for the 'python310'
package(s) announced via the SUSE-SU-2022:2291-1 advisory.

Vulnerability Insight:
This update for python310 fixes the following issues:

- CVE-2015-20107: avoid command injection in the mailcap module
(bsc#1198511).

- Update to 3.10.5:

- Core and Builtins

- gh-93418: Fixed an assert where an f-string has an equal sign '='
following an expression, but there's no trailing brace. For example,
f'{i='.

- gh-91924: Fix __ltrace__ debug feature if the stdout encoding is not
UTF-8. Patch by Victor Stinner.

- gh-93061: Backward jumps after async for loops are no longer given
dubious line numbers.

- gh-93065: Fix contextvars HAMT implementation to handle iteration
over deep trees.

- The bug was discovered and fixed by Eli Libman. See
MagicStack/immutables#84 for more details.

- gh-92311: Fixed a bug where setting frame.f_lineno to jump
over a list comprehension could misbehave or crash.

- gh-92112: Fix crash triggered by an evil custom mro() on a metaclass.

- gh-92036: Fix a crash in subinterpreters related to the garbage
collector. When a subinterpreter is deleted, untrack all objects
tracked by its GC. To prevent a crash in deallocator functions
expecting objects to be tracked by the GC, leak a strong reference
to these objects on purpose, so they are never deleted and their
deallocator functions are not called. Patch by Victor Stinner.

- gh-91421: Fix a potential integer overflow in _Py_DecodeUTF8Ex.

- bpo-47212: Raise IndentationError instead of SyntaxError for a bare
except with no following indent. Improve SyntaxError locations for
an un-parenthesized generator used as arguments. Patch by Matthieu
Dartiailh.

- bpo-47182: Fix a crash when using a named unicode character like
'\N{digit nine}' after the main interpreter has been initialized a
second time.

- bpo-47117: Fix a crash if we fail to decode characters in
interactive mode if the tokenizer buffers are uninitialized. Patch
by Pablo Galindo.

- bpo-39829: Removed the __len__() call when initializing a list and
moved initializing to list_extend. Patch by Jeremiah Pascual.

- bpo-46962: Classes and functions that unconditionally declared their
docstrings ignoring the

- -without-doc-strings compilation flag no longer do so.

- The classes affected are ctypes.UnionType, pickle.PickleBuffer,
testcapi.RecursingInfinitelyEr ...

Description truncated. Please see the references for more information.

Affected Software/OS:
'python310' package(s) on openSUSE Leap 15.4.

Solution:
Please install the updated package(s).

CVSS Score:
8.0

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:C/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-20107
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MYG3EMFR7ZHC46TDNM7SNWO64A3W7EUF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ONXSGLASNLGFL57YU6WT6Y5YURSFV43U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPCLGZZJPVXFWUWVV5WCD5FNUAFLKBDN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6QIKVSW3H6W2GQGDE5DTIWLGFNH6KKEW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FIRUTX47BJD2HYJDLMI7JJBVCYFAPKAQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UIOJUZ5JMEMGSKNISTOVI4PDP36FDL5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/46KWPTI72SSEOF53DOYQBQOCN4QQB2GE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XO2H6CKWLRGTTZCGUQVELW6LUH437Q3O/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCIO2W4DUVVMI6L52QCC4TT2B3K5VWHS/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KAY6VBNVEFUXKJF37WFHYXUSRDEK34N3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AKGMYDVKI3XNM27B6I6RQ6QV3TVJAUCG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5664BGZVTA46LQDNTYX5THG6CN4FYJX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HAI2GBC7WKH7J5NH6J2IW5RT3VF2SF5M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y4E2WBEJ42CGLGDHD6ZXOLZ2W6G3YOVD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/53TQZFLS6O3FLIMVSXFEEPZSWLDZLBOX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PTTZGLD2YBMMG6U6F5HOTPOGGPBIURMA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ERYMM2QVDPOJLX4LYXWYIQN5FOIJLDRY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/57NECACX333A3BBZM2TR2VZ4ZE3UG3SN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DBVY4YC2P6EPZZ2DROOXHDOWZ4BJFLW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F3LNY2NHM6J22O6Q5ANOE3SZRK3OACKR/
https://security.gentoo.org/glsa/202305-02
https://bugs.python.org/issue24778
https://github.com/python/cpython/issues/68966
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.