Skip to content

Commit f2707a6

Browse files
committed
Update release documentation
1 parent 2d53a49 commit f2707a6

File tree

1 file changed

+21
-0
lines changed

1 file changed

+21
-0
lines changed

Doc/whatsnew/3.7.rst

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2615,3 +2615,24 @@ This limit can be configured or disabled by environment variable, command
26152615
line flag, or :mod:`sys` APIs. See the :ref:`integer string conversion
26162616
length limitation <int_max_str_digits>` documentation. The default limit
26172617
is 4300 digits in string form.
2618+
2619+
Notable security feature in 3.7.17.1
2620+
==================================
2621+
2622+
Converting between :class:`int` and :class:`str` in bases other than 2
2623+
(binary), 4, 8 (octal), 16 (hexadecimal), or 32 such as base 10 (decimal)
2624+
now raises a :exc:`ValueError` if the number of digits in string form is
2625+
above a limit to avoid potential denial of service attacks due to the
2626+
algorithmic complexity. This is a mitigation for `CVE-2020-10735
2627+
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10735>`_.
2628+
This limit can be configured or disabled by environment variable, command
2629+
line flag, or :mod:`sys` APIs. See the :ref:`integer string conversion
2630+
length limitation <int_max_str_digits>` documentation. The default limit
2631+
is 4300 digits in string form.
2632+
2633+
An issue in the urllib.parse component of Python before 3.11.4 allows attackers
2634+
to bypass blocklisting methods by supplying a URL that starts with blank
2635+
characters. Leading WHATWG C0 control and space characters are now stripped
2636+
from the URL. This is a mitigation for `CVE-2023-24329
2637+
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329>`_.
2638+

0 commit comments

Comments
 (0)