Debian Package Tracker
Register | Log in
Subscribe

python3.11

Choose email to subscribe with

general
  • source: python3.11 (main)
  • version: 3.11.2-6+deb12u6
  • maintainer: Matthias Klose (DMD)
  • arch: all any
  • std-ver: 4.6.2
  • VCS: Git (Browse)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 3.11.2-6+deb12u6
  • stable-sec: 3.11.2-6+deb12u3
versioned links
  • 3.11.2-6+deb12u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.11.2-6+deb12u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • idle-python3.11
  • libpython3.11
  • libpython3.11-dbg
  • libpython3.11-dev (1 bugs: 0, 0, 1, 0)
  • libpython3.11-minimal
  • libpython3.11-stdlib
  • libpython3.11-testsuite
  • python3.11
  • python3.11-dbg
  • python3.11-dev
  • python3.11-doc
  • python3.11-examples
  • python3.11-full
  • python3.11-minimal
  • python3.11-nopie
  • python3.11-venv
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:02:58
    Last run: 2024-08-12T10:43:08.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:51:44
    Last run: 2024-07-18T23:00:52.000Z
    Previous status: unknown

  • stable: fail (log)
    The tests ran in 0:00:31
    Last run: 2025-08-10T22:26:38.000Z
    Previous status: unknown

Created: 2024-04-20 Last update: 2025-08-14 09:31
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2024-4032: The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
  • CVE-2024-6923: There is a MEDIUM severity vulnerability affecting CPython. The email module didn’t properly quote newlines for email headers when serializing an email message allowing for header injection when an email is serialized.
  • CVE-2024-7592: There is a LOW severity vulnerability affecting CPython, specifically the 'http.cookies' standard library module. When parsing cookies that contained backslashes for quoted characters in the cookie value, the parser would use an algorithm with quadratic complexity, resulting in excess CPU resources being used while parsing the value.
  • CVE-2024-8088: There is a HIGH severity vulnerability affecting the CPython "zipfile" module. When iterating over names of entries in a zip archive (for example, methods of "zipfile.ZipFile" like "namelist()", "iterdir()", "extractall()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected.
  • CVE-2023-27043: The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Created: 2023-02-25 Last update: 2024-08-23 07:51
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2024-4032: The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
  • CVE-2023-27043: The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
Created: 2023-06-11 Last update: 2024-06-30 13:24
1 bug tagged patch in the BTS normal
The BTS contains patches fixing 1 bug, consider including or untagging them.
Created: 2025-01-27 Last update: 2025-08-14 08:31
3 low-priority security issues in bookworm low

There are 3 open security issues in bookworm.

3 issues left for the package maintainer to handle:
  • CVE-2025-4516: (needs triaging) There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.
  • CVE-2025-6069: (needs triaging) The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
  • CVE-2025-8194: (needs triaging) There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. This vulnerability can be mitigated by including the following patch after importing the “tarfile” module:  https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-05-16 Last update: 2025-08-10 06:32
news
[rss feed]
  • [2025-05-03] Accepted python3.11 3.11.2-6+deb12u6 (source) into proposed-updates (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2024-12-08] Accepted python3.11 3.11.2-6+deb12u5 (source) into proposed-updates (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2024-10-10] Accepted python3.11 3.11.2-6+deb12u4 (source) into proposed-updates (Debian FTP Masters) (signed by: Santiago Ruano Rincón)
  • [2024-08-31] Accepted python3.11 3.11.2-6+deb12u3 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-08-27] Accepted python3.11 3.11.2-6+deb12u3 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2024-08-25] Removed 3.11.9-1 from unstable (Debian FTP Masters)
  • [2024-07-23] python3.11 REMOVED from testing (Debian testing watch)
  • [2024-05-20] Accepted python3.11 3.11.2-6+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Stefano Rivera)
  • [2024-04-29] python3.11 3.11.9-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-10] Accepted python3.11 3.11.9-1 (source) into unstable (Matthias Klose)
  • [2024-03-03] Accepted python3.11 3.11.2-6+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Stefano Rivera)
  • [2024-03-03] Accepted python3.11 3.11.8-3 (source) into unstable (Matthias Klose)
  • [2024-02-29] Accepted python3.11 3.11.8-2 (source) into unstable (Matthias Klose)
  • [2024-02-26] Accepted python3.11 3.11.8-1.1~exp2 (source) into experimental (Michael Hudson-Doyle)
  • [2024-02-26] Accepted python3.11 3.11.8-1.1~exp1 (source) into experimental (Michael Hudson-Doyle)
  • [2024-02-12] python3.11 3.11.8-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-07] Accepted python3.11 3.11.8-1 (source) into unstable (Matthias Klose)
  • [2023-12-12] python3.11 3.11.7-2 MIGRATED to testing (Debian testing watch)
  • [2023-12-08] Accepted python3.11 3.11.7-2 (source) into unstable (Matthias Klose)
  • [2023-12-05] Accepted python3.11 3.11.7-1 (source) into unstable (Matthias Klose)
  • [2023-10-14] python3.11 3.11.6-3 MIGRATED to testing (Debian testing watch)
  • [2023-10-08] Accepted python3.11 3.11.6-3 (source) into unstable (Matthias Klose)
  • [2023-10-06] Accepted python3.11 3.11.6-2 (source) into unstable (Matthias Klose)
  • [2023-10-04] Accepted python3.11 3.11.6-1 (source) into unstable (Matthias Klose)
  • [2023-09-01] python3.11 3.11.5-3 MIGRATED to testing (Debian testing watch)
  • [2023-08-29] Accepted python3.11 3.11.5-3 (source) into unstable (Matthias Klose)
  • [2023-08-29] python3.11 3.11.5-2 MIGRATED to testing (Debian testing watch)
  • [2023-08-26] Accepted python3.11 3.11.5-2 (source) into unstable (Matthias Klose)
  • [2023-08-25] Accepted python3.11 3.11.5-1 (source) into unstable (Matthias Klose)
  • [2023-06-13] python3.11 3.11.4-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 1
  • RC: 0
  • I&N: 0
  • M&W: 1
  • F&P: 0
  • patch: 1
links
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing