Discussion:
Bug#1091325: bookworm-pu: package pypy3/7.3.11+dfsg-2+deb12u3
(too old to reply)
Stefano Rivera
2024-12-23 20:40:01 UTC
Permalink
Package: release.debian.org
Severity: normal
Tags: bookworm
X-Debbugs-Cc: ***@packages.debian.org
Control: affects -1 + src:pypy3
User: ***@packages.debian.org
Usertags: pu

Update pypy3 for the same security issues as cpython3 in bookworm:

* Security patches to the standard library:
- CVE-2023-27043: Parse email addresses with special characters,
correctly.
- CVE-2024-9287: Quote path names in venv activation scripts.
- CVE-2024-4032: Fix private IP address ranges.
- CVE-2024-6232: Fix ReDoS when parsing tarfile headers.
- CVE-2024-8088: Avoid infinite loop in zip file parsing.
- CVE-2024-6923: Encode newlines in headers in the email module.
- CVE-2024-7592: Quadratic complexity parsing cookies with backslashes.
- CVE-2024-11168: Ensure addresses in brackets are valid IPv6 addresses.

And some housekeeping:

* Clean the python 2.7 source tree.
* Clean cffi modules C source, lex and yacc tabs.

[ Reason ]
Security updates that the security team doesn't consider urgent enough
to warrant a DSA for.

[ Impact ]
Of these, CVE-2024-8088 is labelled HIGH in its description. I see we
also issued a DSA for CVE-2024-4032 in cpython.

[ Tests ]
The patches all come from cPython, so we've already got some confidence
in them. cPython is pretty good about including regression tests in
everything. I've test-built pypy3 and checked that all the new tests are
passing (pypy3 always has a lot of failing tests, so we ignore results,
sorry about that).

[ Risks ]
If they weren't an issue for cPython, they're almost certainly not for
PyPy, the user-base is much smaller.

[ Checklist ]
[x] *all* changes are documented in the d/changelog
[x] I reviewed all changes and I approve them
[x] attach debdiff against the package in (old)stable
[x] the issue is verified as fixed in unstable

[ Changes ]
See the changelog above.

[ Other info ]
Uploaded to bookworm.
Debian Bug Tracking System
2024-12-23 20:40:01 UTC
Permalink
Post by Stefano Rivera
affects -1 + src:pypy3
Bug #1091325 [release.debian.org] bookworm-pu: package pypy3/7.3.11+dfsg-2+deb12u3
Added indication that 1091325 affects src:pypy3
--
1091325: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091325
Debian Bug Tracking System
Contact ***@bugs.debian.org with problems
Adam D Barratt
2024-12-30 22:20:01 UTC
Permalink
package release.debian.org
tags 1091325 = bookworm pending
thanks

Hi,

The upload referenced by this bug report has been flagged for acceptance into the proposed-updates queue for Debian bookworm.

Thanks for your contribution!

Upload details
==============

Package: pypy3
Version: 7.3.11+dfsg-2+deb12u3

Explanation: fix email address parsing issue [CVE-2023-27043]; fix possible Server Side Request Forgery issue [CVE-2024-11168]; fix private IP address range parsing [CVE-2024-4032]; fix regular expression based Denial of Service issue [CVE-2024-6232]; fix header injection issue [CVE-2024-6923]; fix denial of service issue [CVE-2024-7592 CVE-2024-8088]; fix command injection issue [CVE-2024-9287]
Debian Bug Tracking System
2024-12-30 22:20:02 UTC
Permalink
Post by Adam D Barratt
package release.debian.org
Limiting to bugs with field 'package' containing at least one of 'release.debian.org'
Limit currently set to 'package':'release.debian.org'
Post by Adam D Barratt
tags 1091325 = bookworm pending
Bug #1091325 [release.debian.org] bookworm-pu: package pypy3/7.3.11+dfsg-2+deb12u3
Added tag(s) pending.
Post by Adam D Barratt
thanks
Stopping processing here.

Please contact me if you need assistance.
--
1091325: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091325
Debian Bug Tracking System
Contact ***@bugs.debian.org with problems
Debian Bug Tracking System
2025-01-11 11:20:02 UTC
Permalink
Your message dated Sat, 11 Jan 2025 11:03:09 +0000
with message-id <E1tWZGn-009jaQ-***@coccia.debian.org>
and subject line Close 1091325
has caused the Debian Bug report #1091325,
regarding bookworm-pu: package pypy3/7.3.11+dfsg-2+deb12u3
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ***@bugs.debian.org
immediately.)
--
1091325: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1091325
Debian Bug Tracking System
Contact ***@bugs.debian.org with problems
Loading...