@@ -2615,3 +2615,24 @@ This limit can be configured or disabled by environment variable, command
26152615line flag, or :mod: `sys ` APIs. See the :ref: `integer string conversion
26162616length limitation <int_max_str_digits>` documentation. The default limit
26172617is 4300 digits in string form.
2618+
2619+ Notable security feature in 3.7.17.1
2620+ ==================================
2621+
2622+ Converting between :class: `int ` and :class: `str ` in bases other than 2
2623+ (binary), 4, 8 (octal), 16 (hexadecimal), or 32 such as base 10 (decimal)
2624+ now raises a :exc: `ValueError ` if the number of digits in string form is
2625+ above a limit to avoid potential denial of service attacks due to the
2626+ algorithmic complexity. This is a mitigation for `CVE-2020-10735
2627+ <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735> `_.
2628+ This limit can be configured or disabled by environment variable, command
2629+ line flag, or :mod: `sys ` APIs. See the :ref: `integer string conversion
2630+ length limitation <int_max_str_digits>` documentation. The default limit
2631+ is 4300 digits in string form.
2632+
2633+ An issue in the urllib.parse component of Python before 3.11.4 allows attackers
2634+ to bypass blocklisting methods by supplying a URL that starts with blank
2635+ characters. Leading WHATWG C0 control and space characters are now stripped
2636+ from the URL. This is a mitigation for `CVE-2023-24329
2637+ <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329> `_.
2638+
0 commit comments