Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/python3.13@0?distro=trixie
purl pkg:deb/debian/python3.13@0?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (6)
Vulnerability Summary Aliases
VCID-2v5u-2z4w-ffgx python: incorrect IPv4 and IPv6 private ranges CVE-2024-4032
VCID-8hug-fhhb-sbgt python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used CVE-2024-5642
VCID-qwhz-912b-8kh5 cpython: python: Memory race condition in ssl.SSLContext certificate store methods CVE-2024-0397
VCID-s5yq-pjhc-fbcm python: Default mimetype known files writeable on Windows CVE-2024-3220
VCID-ymg5-42xm-7fh9 The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included. CVE-2024-3219
VCID-zxzn-25zt-ukct Mitgation of CVE-2026-4519 was incomplete. If the URL contained "%action" the mitigation could be bypassed for certain browser types the "webbrowser.open()" API could have commands injected into the underlying shell. See CVE-2026-4519 for details. CVE-2026-4786

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-17T22:44:41.047473+00:00 Debian Importer Fixing VCID-zxzn-25zt-ukct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:11:29.990504+00:00 Debian Importer Fixing VCID-qwhz-912b-8kh5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:57:59.063120+00:00 Debian Importer Fixing VCID-2v5u-2z4w-ffgx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:32:36.183757+00:00 Debian Importer Fixing VCID-ymg5-42xm-7fh9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:30.707175+00:00 Debian Importer Fixing VCID-s5yq-pjhc-fbcm https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:38:48.050761+00:00 Debian Importer Fixing VCID-8hug-fhhb-sbgt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:04:39.379401+00:00 Debian Importer Fixing VCID-qwhz-912b-8kh5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:10:11.516366+00:00 Debian Importer Fixing VCID-2v5u-2z4w-ffgx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:52:05.854301+00:00 Debian Importer Fixing VCID-ymg5-42xm-7fh9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:53.628421+00:00 Debian Importer Fixing VCID-s5yq-pjhc-fbcm https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:11:52.827709+00:00 Debian Importer Fixing VCID-8hug-fhhb-sbgt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:00.360810+00:00 Debian Importer Fixing VCID-8hug-fhhb-sbgt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:00.333521+00:00 Debian Importer Fixing VCID-2v5u-2z4w-ffgx https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:00.306065+00:00 Debian Importer Fixing VCID-s5yq-pjhc-fbcm https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:00.278747+00:00 Debian Importer Fixing VCID-ymg5-42xm-7fh9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:00.187986+00:00 Debian Importer Fixing VCID-qwhz-912b-8kh5 https://security-tracker.debian.org/tracker/data/json 38.1.0