Path: ...!weretis.net!feeder8.news.weretis.net!news.mixmin.net!aioe.org!bofh.it!news.nic.it!robomod From: Moritz Muehlenhoff Newsgroups: linux.debian.announce.security Subject: [SECURITY] [DSA 5269-1] pypy3 security update Date: Wed, 02 Nov 2022 20:00:01 +0100 Message-ID: X-Original-To: debian-security-announce@lists.debian.org X-Mailbox-Line: From debian-security-announce-request@lists.debian.org Wed Nov 2 18:55:12 2022 Old-Return-Path: X-Amavis-Spam-Status: No, score=-114.005 tagged_above=-10000 required=5.3 tests=[BAYES_00=-2, DIGITS_LETTERS=1, DKIMWL_WL_HIGH=-0.515, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FVGT_m_MULTI_ODD=0.02, LDO_WHITELIST=-5, PGPSIGNATURE=-5, RCVD_IN_DNSWL_MED=-2.3, USER_IN_DKIM_WELCOMELIST=-0.01, USER_IN_DKIM_WHITELIST=-100] autolearn=ham autolearn_force=no Old-Dkim-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From:Date :Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=iIPJQdMVXY8OvDb11GjwuldmVU4ak0GYA1VEVL8q6+c=; b=jv qk0NZ3RLJG6UuHNUAPdSnbDvPNlDXKsMLUCE1UnCHFi2hfyJI6gHMgIK23rGVRkHqTtfC2JVSMFOA RAcBeC3ml1ZWawBzVi66Dcsl9nZNQHArQSlHrZnNQvXIgY0LAlhZNa4FNp83IGgmqMEwnMJL7azkF zsWvcvqFutOanwgDP9IrRJl+6NYIgGEA+aiRtW2y27vsg3t7MKOo3OU9S0xKpPmVXq2ZjFjSIhiqU sZvS7FwTwn8GeB129drx5EWdf8YBhAg7JI6HDQEABK6yGRPlrZizds3fLNVOB5ZvHzu0XTFFYGMuq MEBIWt2b8TY0jdMscED/3gLlHrnQrn/A==; MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Debian: PGP check passed for security officers Priority: urgent Reply-To: debian-security-announce-request@lists.debian.org X-Mailing-List: archive/latest/4168 List-ID: List-URL: List-Archive: https://lists.debian.org/msgid-search/Y2K89/5d7GK2ZLzd@seger.debian.org Approved: robomod@news.nic.it Lines: 45 Organization: linux.* mail to news gateway Sender: robomod@news.nic.it X-Original-Date: Wed, 2 Nov 2022 18:54:47 +0000 X-Original-Message-ID: Bytes: 4396 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-5269-1 security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff November 02, 2022 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : pypy3 CVE ID : CVE-2022-37454 Nicky Mouha discovered a buffer overflow in the sha3 module of PyPy, a fast, compliant alternative implementation of the Python language. For the stable distribution (bullseye), this problem has been fixed in version 7.3.5+dfsg-2+deb11u2. We recommend that you upgrade your pypy3 packages. For the detailed security status of pypy3 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/pypy3 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmNivD4ACgkQEMKTtsN8 TjYcfxAAhkg2+/s7yTHve08CkBReV5cZ+z3cJSCCm53l4CHbpiNcza7IPzi0/GMj EupYEF+Mozvtm2puVgnWRkckuF5Nss3+yZYpHpPug4AHbEQy7GD7OdqVkV6aih0o AgIfd2jeaxzUAEEQ/7Mr+wInMknxDGmW5giFo2vUvR5dESRcfuImyaiJBlT6KUZY 5ocMpp/JNcomfI61vJnzpqcnP8MMSLfzQuyyJoWXlUonJJCKw881Em2buRDRIZJJ r3Gl5uF4vXUsJEWQqLMvpqJfCwjI+h6gmkZexv8fklU+xF5NFbf8Hlo2mOJq7mZV X6xplm0AhgsaqtM/dm1U4jHFflLvJ6LYTRTP3XqsuysSMhmURE6n7wUZBF/BvCqn 747nS3yKFKyWXcP2AuEwZy1awo2xWigk5QJLIpcMcYP1MxLrMYZE2F59xXTctPLd wxZjdT1PZIUmxHVw3+kGDkGB/4EB9DGTYP925Acj+pwnrgBgwisQs0o2vKkKhYMZ 3xvUf0BMszbVmNMBHE0YFPtAD/H8ALdxOTFwMtihQzBKvwmiBohn1lLRr00rNpai YxJVOPxPFQUhI/RrB2m1BD0aAWSPNGZu8THbYyxA+1Sur3DMMRrihDLGfcZj2RzK GMEkUffW5oj9ZQeqhele6vfqHfvWRnhjc8rVkhRlyFCYLsHtnM4= =2m5H -----END PGP SIGNATURE-----