Debian Package Tracker
Register | Log in
Subscribe

python2.7

Interactive high-level object-oriented language (version 2.7)

Choose email to subscribe with

general
  • source: python2.7 (main)
  • version: 2.7.18-1
  • maintainer: Matthias Klose (DMD)
  • arch: all any
  • std-ver: 4.5.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 2.7.9-2+deb8u1
  • o-o-sec: 2.7.9-2+deb8u5
  • oldstable: 2.7.13-2+deb9u3
  • old-sec: 2.7.13-2+deb9u4
  • stable: 2.7.16-2+deb10u1
  • testing: 2.7.18-1
  • unstable: 2.7.18-1
versioned links
  • 2.7.9-2+deb8u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.9-2+deb8u5: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.13-2+deb9u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.13-2+deb9u4: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.16-2+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 2.7.18-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • idle-python2.7 (2 bugs: 0, 1, 1, 0)
  • libpython2.7 (2 bugs: 0, 2, 0, 0)
  • libpython2.7-dbg (1 bugs: 0, 1, 0, 0)
  • libpython2.7-dev (1 bugs: 0, 1, 0, 0)
  • libpython2.7-minimal (1 bugs: 0, 0, 1, 0)
  • libpython2.7-stdlib (3 bugs: 0, 3, 0, 0)
  • libpython2.7-testsuite
  • python2.7 (25 bugs: 0, 20, 5, 0)
  • python2.7-dbg
  • python2.7-dev (3 bugs: 0, 3, 0, 0)
  • python2.7-doc
  • python2.7-examples (3 bugs: 0, 0, 3, 0)
  • python2.7-minimal (1 bugs: 0, 1, 0, 0)
action needed
Debci reports failed tests high
  • unstable: pass (log)
    The tests ran in 0:19:56
    Last run: 2020-05-17 11:58:17 UTC
    Previous status: pass

  • testing: pass (log)
    The tests ran in 0:25:42
    Last run: 2021-01-20 23:58:57 UTC
    Previous status: pass

  • stable: fail (log)
    The tests ran in 0:16:34
    Last run: 2019-06-30 22:45:32 UTC
    Previous status: fail

Created: 2019-10-06 Last update: 2021-01-24 07:11
3 security issues in sid high
There are 3 open security issues in sid.
3 important issues:
  • CVE-2019-20907: In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
  • CVE-2020-8492: Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
  • CVE-2021-3177: Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Please fix them.
Created: 2020-01-30 Last update: 2021-01-23 18:09
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2019-10-10 Last update: 2021-01-17 05:34
lintian reports 8 errors and 50 warnings high
Lintian reports 8 errors and 50 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-07-29 Last update: 2020-10-22 04:34
AppStream hints: 1 error high
AppStream found metadata issues for packages:
  • idle-python2.7: 1 error
You should get rid of them to provide more metadata about this software.
Created: 2018-11-29 Last update: 2018-11-29 10:00
1 bug tagged help in the BTS normal
The BTS contains 1 bug tagged help, please consider helping the maintainer in dealing with it.
Created: 2019-03-21 Last update: 2021-01-24 07:02
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2020-10-19 Last update: 2021-01-24 07:02
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2018-09-11 Last update: 2021-01-24 06:57
3 ignored security issues in stretch low
There are 3 open security issues in stretch.
3 issues skipped by the security teams:
  • CVE-2019-16935: The documentation XML-RPC server in Python through 2.7.16, 3.x through 3.6.9, and 3.7.x through 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_server_title is called with untrusted input, arbitrary JavaScript can be delivered to clients that visit the http URL for this server.
  • CVE-2020-8492: Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
  • CVE-2021-3177: Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Please fix them.
Created: 2019-01-16 Last update: 2021-01-23 18:09
3 ignored security issues in buster low
There are 3 open security issues in buster.
3 issues skipped by the security teams:
  • CVE-2019-20907: In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
  • CVE-2020-8492: Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
  • CVE-2021-3177: Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Please fix them.
Created: 2020-01-30 Last update: 2021-01-23 18:09
3 ignored security issues in bullseye low
There are 3 open security issues in bullseye.
3 issues skipped by the security teams:
  • CVE-2019-20907: In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
  • CVE-2020-8492: Python 2.7 through 2.7.17, 3.5 through 3.5.9, 3.6 through 3.6.10, 3.7 through 3.7.6, and 3.8 through 3.8.1 allows an HTTP server to conduct Regular Expression Denial of Service (ReDoS) attacks against a client because of urllib.request.AbstractBasicAuthHandler catastrophic backtracking.
  • CVE-2021-3177: Python 3.x through 3.9.1 has a buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution in certain Python applications that accept floating-point numbers as untrusted input, as demonstrated by a 1e300 argument to c_double.from_param. This occurs because sprintf is used unsafely.
Please fix them.
Created: 2020-01-30 Last update: 2021-01-23 18:09
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2019-02-18 Last update: 2019-02-18 23:47
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.5.1 instead of 4.5.0).
Created: 2020-11-17 Last update: 2020-11-17 05:41
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2020-08-22] Accepted python2.7 2.7.13-2+deb9u4 (source all amd64) into oldstable (Thorsten Alteholz)
  • [2020-04-23] python2.7 2.7.18-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-20] Accepted python2.7 2.7.18-1 (source) into unstable (Matthias Klose)
  • [2020-04-10] python2.7 2.7.18~rc1-2 MIGRATED to testing (Debian testing watch)
  • [2020-04-07] Accepted python2.7 2.7.18~rc1-2 (source) into unstable (Matthias Klose)
  • [2020-04-07] Accepted python2.7 2.7.18~rc1-1 (source) into unstable (Matthias Klose)
  • [2019-11-09] Accepted python2.7 2.7.16-2+deb10u1 (source all amd64) into proposed-updates->stable-new, proposed-updates (Moritz Mühlenhoff)
  • [2019-10-22] python2.7 2.7.17-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-20] Accepted python2.7 2.7.17-1 (source) into unstable (Matthias Klose)
  • [2019-10-12] python2.7 2.7.17~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2019-10-10] Accepted python2.7 2.7.17~rc1-1 (source) into unstable (Matthias Klose)
  • [2019-09-16] Accepted python2.7 2.7.9-2+deb8u5 (source all amd64) into oldoldstable (Roberto C. Sanchez)
  • [2019-09-08] python2.7 2.7.16-4 MIGRATED to testing (Debian testing watch)
  • [2019-09-04] Accepted python2.7 2.7.16-4 (source) into unstable (Matthias Klose)
  • [2019-08-31] Accepted python2.7 2.7.9-2+deb8u4 (source all amd64) into oldoldstable (Thorsten Alteholz)
  • [2019-07-23] python2.7 2.7.16-3 MIGRATED to testing (Debian testing watch)
  • [2019-07-08] Accepted python2.7 2.7.16-3 (source) into unstable (Matthias Klose)
  • [2019-06-25] Accepted python2.7 2.7.9-2+deb8u3 (source all amd64) into oldstable (Roberto C. Sanchez)
  • [2019-04-11] python2.7 2.7.16-2 MIGRATED to testing (Debian testing watch)
  • [2019-04-06] Accepted python2.7 2.7.16-2 (source) into unstable (Matthias Klose)
  • [2019-04-05] python2.7 2.7.16-1 MIGRATED to testing (Debian testing watch)
  • [2019-03-04] Accepted python2.7 2.7.16-1 (source) into unstable (Matthias Klose)
  • [2019-02-28] python2.7 2.7.16~rc1-1 MIGRATED to testing (Debian testing watch)
  • [2019-02-18] Accepted python2.7 2.7.16~rc1-1 (source) into unstable (Matthias Klose)
  • [2019-02-16] Accepted python2.7 2.7.15-9 (source) into unstable (Matthias Klose)
  • [2019-02-05] python2.7 2.7.15-8 MIGRATED to testing (Debian testing watch)
  • [2019-02-03] Accepted python2.7 2.7.15-8 (source) into unstable (Matthias Klose)
  • [2019-02-03] Accepted python2.7 2.7.15-7 (source) into unstable (Matthias Klose)
  • [2019-02-01] Accepted python2.7 2.7.15-6 (source) into unstable (Matthias Klose)
  • [2018-12-01] python2.7 2.7.15-5 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 48
  • RC: 0
  • I&N: 36
  • M&W: 12
  • F&P: 0
  • patch: 1
  • help: 1
links
  • lintian (8, 50)
  • buildd: logs, checks, clang, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 2.7.18-1build2
  • 44 bugs (2 patches)

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing