It was discovered that Python incorrectly handled certain inputs. If a user or an automated system were tricked into running a specially crafted input, a remote attacker could possibly use this issue to execute arbitrary code. (CVE-2022-37454)
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "idle-python3.8" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "libpython3.8" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "libpython3.8-dbg" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "libpython3.8-dev" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "libpython3.8-minimal" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "libpython3.8-stdlib" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "libpython3.8-testsuite" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "python3.8" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "python3.8-dbg" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "python3.8-dev" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "python3.8-examples" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "python3.8-minimal" }, { "binary_version": "3.8.0-3ubuntu1~18.04.2+esm1", "binary_name": "python3.8-venv" } ] }