Skip to content

Commit 22b6ffd

Browse files
authored
Merge pull request #37 from ActiveState/BE-3465-update-any-copyright-and-release-notes-that-are-needed
Be 3465 update any copyright and release notes that are needed
2 parents eb5615d + 6061a68 commit 22b6ffd

File tree

2 files changed

+47
-1
lines changed

2 files changed

+47
-1
lines changed

Include/patchlevel.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@
2727
#define PY_RELEASE_SERIAL 0
2828

2929
/* Version as a string */
30-
#define PY_VERSION "2.7.18.7"
30+
#define PY_VERSION "2.7.18.8"
3131
/*--end constants--*/
3232

3333
/* Subversion Revision number of this file (not of the repository). Empty

Misc/NEWS.d/2.7.18.8.rst

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
.. bpo: 37428
2+
.. date: 2024-02-15
3+
.. nonce:
4+
.. release date: 2024-02-15
5+
.. section: Core and Builtins
6+
7+
CVE-2023-40217
8+
9+
SSLContext.post_handshake_auth = True no longer sets
10+
SSL_VERIFY_POST_HANDSHAKE verify flag for client connections. Although the
11+
option is documented as ignored for clients, OpenSSL implicitly enables cert
12+
chain validation when the flag is set.
13+
14+
.. bpo: ?
15+
.. date: 2024-02-15
16+
.. nonce:
17+
.. release date: 2024-02-15
18+
.. section: Core and Builtins
19+
20+
CVE-2023-24329
21+
22+
Start stripping C0 control and space chars in urlsplit (#… …102508)
23+
24+
`urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit #25595.
25+
26+
This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/#url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329).
27+
28+
.. bpo: 43882
29+
.. date: 2024-02-15
30+
.. nonce:
31+
.. release date: 2024-02-15
32+
.. section: Core and Builtins
33+
34+
CVE-2022-0391
35+
36+
A flaw was found in Python, specifically within the urllib.parse module. This module helps break Uniform Resource Locator (URL) strings into components. The issue involves how the urlparse method does not sanitize input and allows characters like '\r' and '\n' in the URL path. This flaw allows an attacker to input a crafted URL, leading to injection attacks. This flaw affects Python versions prior to 3.10.0b1, 3.9.5, 3.8.11, 3.7.11 and 3.6.14.
37+
38+
.. bpo: 43285
39+
.. date: 2024-02-15
40+
.. nonce:
41+
.. release date: 2024-02-15
42+
.. section: Core and Builtins
43+
44+
CVE-2021-4189
45+
46+
A flaw was found in Python, specifically in the FTP (File Transfer Protocol) client library in PASV (passive) mode. The issue is how the FTP client trusts the host from the PASV response by default. This flaw allows an attacker to set up a malicious FTP server that can trick FTP clients into connecting back to a given IP address and port. This vulnerability could lead to FTP client scanning ports, which otherwise would not have been possible.

0 commit comments

Comments
 (0)