Debian Package Tracker
Register | Log in
Subscribe

python3.12

Interactive high-level object-oriented language (version 3.12)

Choose email to subscribe with

general
  • source: python3.12 (main)
  • version: 3.12.10-1
  • maintainer: Matthias Klose (DMD)
  • uploaders: Stefano Rivera [DMD]
  • arch: all any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • unstable: 3.12.10-1
versioned links
  • 3.12.10-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • idle-python3.12
  • libpython3.12-dev (1 bugs: 0, 1, 0, 0)
  • libpython3.12-minimal
  • libpython3.12-stdlib (1 bugs: 0, 1, 0, 0)
  • libpython3.12-testsuite
  • libpython3.12t64
  • libpython3.12t64-dbg
  • python3.12 (3 bugs: 0, 3, 0, 0)
  • python3.12-dbg
  • python3.12-dev
  • python3.12-doc
  • python3.12-examples
  • python3.12-full
  • python3.12-gdbm
  • python3.12-minimal
  • python3.12-nopie
  • python3.12-tk
  • python3.12-venv
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 1:04:57
    Last run: 2025-06-26T07:34:48.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 1:02:40
    Last run: 2025-02-23T10:14:42.000Z
    Previous status: unknown

Created: 2025-06-26 Last update: 2025-07-02 22:02
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-03-15 Last update: 2025-07-02 00:28
7 security issues in sid high

There are 7 open security issues in sid.

7 important issues:
  • CVE-2025-4138: Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
  • CVE-2025-4330: Allows the extraction filter to be ignored, allowing symlink targets to point outside the destination directory, and the modification of some file metadata. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
  • CVE-2025-4435: When using a TarFile.errorlevel = 0 and extracting with a filter the documented behavior is that any filtered members would be skipped and not extracted. However the actual behavior of TarFile.errorlevel = 0 in affected versions is that the member would still be extracted and not skipped.
  • CVE-2025-4516: There is an issue in CPython when using `bytes.decode("unicode_escape", error="ignore|replace")`. If you are not using the "unicode_escape" encoding or an error handler your usage is not affected. To work-around this issue you may stop using the error= handler and instead wrap the bytes.decode() call in a try-except catching the DecodeError.
  • CVE-2025-4517: Allows arbitrary filesystem writes outside the extraction directory during extraction with filter="data". You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
  • CVE-2025-6069: The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
  • CVE-2024-12718: Allows modifying some file metadata (e.g. last modified) with filter="data" or file permissions (chmod) with filter="tar" of files outside the extraction directory. You are affected by this vulnerability if using the tarfile module to extract untrusted tar archives using TarFile.extractall() or TarFile.extract() using the filter= parameter with a value of "data" or "tar". See the tarfile extraction filters documentation https://docs.python.org/3/library/tarfile.html#tarfile-extraction-filter  for more information. Only Python versions 3.12 or later are affected by these vulnerabilities, earlier versions don't include the extraction filter feature. Note that for Python 3.14 or later the default value of filter= changed from "no filtering" to `"data", so if you are relying on this new default behavior then your usage is also affected. Note that none of these vulnerabilities significantly affect the installation of source distributions which are tar archives as source distributions already allow arbitrary code execution during the build process. However when evaluating source distributions it's important to avoid installing source distributions with suspicious links.
Created: 2025-05-16 Last update: 2025-06-18 05:00
lintian reports 3 errors and 20 warnings high
Lintian reports 3 errors and 20 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2025-04-10 Last update: 2025-04-10 00:32
debian/patches: 1 patch with invalid metadata, 15 patches to forward upstream high

Among the 31 debian patches available in version 3.12.10-1 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
  • 15 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-05-25 Last update: 2025-04-09 12:01
AppStream hints: 1 error and 1 warning for idle-python3.12 high
AppStream found metadata issues for packages:
  • idle-python3.12: 1 error and 1 warning
You should get rid of them to provide more metadata about this software.
Created: 2025-01-09 Last update: 2025-01-09 23:30
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 20-day delay is over. Check why.
Created: 2025-04-19 Last update: 2025-07-02 21:02
Depends on packages which need a new maintainer normal
The packages that python3.12 depends on which need a new maintainer are:
  • db5.3 (#1055356)
    • Depends: libdb5.3t64 libdb5.3t64
  • db-defaults (#1055344)
    • Build-Depends: libdb-dev
Created: 2023-11-04 Last update: 2025-07-02 20:32
Multiarch hinter reports 2 issue(s) normal
There are issues with the multiarch metadata for this package.
  • python3.12-examples could be marked Multi-Arch: foreign
  • python3.12-gdbm could be marked Multi-Arch: same
Created: 2023-05-25 Last update: 2025-07-02 19:35
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2024-12-04 Last update: 2024-12-04 21:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-04-09 13:26
testing migrations
  • excuses:
    • Migration status for python3.12 (- to 3.12.10-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating python3.12 would introduce bugs in testing: #1099668
    • ∙ ∙ blocked by freeze: is not in testing
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/p/python3.12.html
    • ∙ ∙ autopkgtest for python3.12/3.12.10-1: amd64: Pass, arm64: Pass, armel: Pass, armhf: Pass, i386: Pass, ppc64el: Pass, riscv64: Test in progress (will not be considered a regression), s390x: Pass
    • ∙ ∙ New but not reproducible on amd64 - info ♻
    • ∙ ∙ New but not reproducible on arm64 - info ♻
    • ∙ ∙ Waiting for reproducibility test results on armhf - info ♻
    • ∙ ∙ 85 days old (needed 20 days)
    • Not considered
news
[rss feed]
  • [2025-04-09] Accepted python3.12 3.12.10-1 (source) into unstable (Matthias Klose)
  • [2025-03-14] python3.12 REMOVED from testing (Debian testing watch)
  • [2025-02-10] python3.12 3.12.9-1 MIGRATED to testing (Debian testing watch)
  • [2025-02-05] Accepted python3.12 3.12.9-1 (source) into unstable (Stefano Rivera)
  • [2025-01-18] python3.12 3.12.8-5 MIGRATED to testing (Debian testing watch)
  • [2025-01-11] Accepted python3.12 3.12.8-5 (source) into unstable (Matthias Klose)
  • [2025-01-08] Accepted python3.12 3.12.8-4 (source) into unstable (Matthias Klose)
  • [2024-12-15] python3.12 3.12.8-3 MIGRATED to testing (Debian testing watch)
  • [2024-12-13] Accepted python3.12 3.12.8-3 (source) into unstable (Matthias Klose)
  • [2024-12-12] Accepted python3.12 3.12.8-2 (source) into unstable (Matthias Klose)
  • [2024-12-07] python3.12 3.12.8-1 MIGRATED to testing (Debian testing watch)
  • [2024-12-04] Accepted python3.12 3.12.8-1 (source) into unstable (Stefano Rivera)
  • [2024-11-10] python3.12 3.12.7-3 MIGRATED to testing (Debian testing watch)
  • [2024-11-09] python3.12 3.12.7-2 MIGRATED to testing (Debian testing watch)
  • [2024-11-08] Accepted python3.12 3.12.7-3 (source) into unstable (Stefano Rivera)
  • [2024-11-05] Accepted python3.12 3.12.7-2 (source) into unstable (Stefano Rivera)
  • [2024-10-03] Accepted python3.12 3.12.7-1 (source) into unstable (Stefano Rivera)
  • [2024-09-10] python3.12 3.12.6-1 MIGRATED to testing (Debian testing watch)
  • [2024-09-07] Accepted python3.12 3.12.6-1 (source) into unstable (Stefano Rivera)
  • [2024-08-27] python3.12 3.12.5-4 MIGRATED to testing (Debian testing watch)
  • [2024-08-22] Accepted python3.12 3.12.5-4 (source) into unstable (Matthias Klose)
  • [2024-08-22] Accepted python3.12 3.12.5-3 (source) into unstable (Matthias Klose)
  • [2024-08-21] Accepted python3.12 3.12.5-2 (source all amd64) into experimental (Debian FTP Masters) (signed by: Matthias Klose)
  • [2024-08-07] Accepted python3.12 3.12.5-1 (source) into unstable (Matthias Klose)
  • [2024-07-20] python3.12 3.12.4-3 MIGRATED to testing (Debian testing watch)
  • [2024-07-15] Accepted python3.12 3.12.4-3 (source) into unstable (Matthias Klose)
  • [2024-07-15] Accepted python3.12 3.12.4-2 (source) into unstable (Matthias Klose)
  • [2024-06-19] python3.12 3.12.4-1 MIGRATED to testing (Debian testing watch)
  • [2024-06-12] Accepted python3.12 3.12.4-1 (source) into unstable (Stefano Rivera)
  • [2024-04-29] python3.12 3.12.3-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 7
  • RC: 1
  • I&N: 6
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • lintian (3, 20)
  • buildd: logs, checks, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing