|
| 1 | +.. date: 2024-05-29-17-05-28 |
| 2 | +.. gh-issue: 119690 |
| 3 | +.. nonce: U6RMtm |
| 4 | +.. release date: 2024-09-07 |
| 5 | +.. section: Windows |
| 6 | +
|
| 7 | +Fixes data type confusion in audit events raised by ``_winapi.CreateFile`` |
| 8 | +and ``_winapi.CreateNamedPipe``. |
| 9 | + |
| 10 | +.. |
| 11 | +
|
| 12 | +.. date: 2024-03-14-01-58-22 |
| 13 | +.. gh-issue: 116773 |
| 14 | +.. nonce: H2UldY |
| 15 | +.. section: Windows |
| 16 | +
|
| 17 | +Fix instances of ``<_overlapped.Overlapped object at 0xXXX> still has |
| 18 | +pending operation at deallocation, the process may crash``. |
| 19 | + |
| 20 | +.. |
| 21 | +
|
| 22 | +.. date: 2024-05-25-17-06-01 |
| 23 | +.. gh-issue: 112769 |
| 24 | +.. nonce: kdLJmS |
| 25 | +.. section: Tests |
| 26 | +
|
| 27 | +The tests now correctly compare zlib version when |
| 28 | +:const:`zlib.ZLIB_RUNTIME_VERSION` contains non-integer suffixes. For |
| 29 | +example zlib-ng defines the version as ``1.3.0.zlib-ng``. |
| 30 | + |
| 31 | +.. |
| 32 | +
|
| 33 | +.. date: 2024-03-24-23-49-25 |
| 34 | +.. gh-issue: 117187 |
| 35 | +.. nonce: eMLT5n |
| 36 | +.. section: Tests |
| 37 | +
|
| 38 | +Fix XML tests for vanilla Expat <2.6.0. |
| 39 | + |
| 40 | +.. |
| 41 | +
|
| 42 | +.. date: 2022-12-23-13-29-55 |
| 43 | +.. gh-issue: 100454 |
| 44 | +.. nonce: 3no0cW |
| 45 | +.. section: Tests |
| 46 | +
|
| 47 | +Fix SSL tests CI for OpenSSL 3.1+ |
| 48 | + |
| 49 | +.. |
| 50 | +
|
| 51 | +.. date: 2024-09-04-12-41-35 |
| 52 | +.. gh-issue: 123678 |
| 53 | +.. nonce: N41y9n |
| 54 | +.. section: Security |
| 55 | +
|
| 56 | +Upgrade libexpat to 2.6.3 |
| 57 | + |
| 58 | +.. |
| 59 | +
|
| 60 | +.. date: 2024-07-22-13-14-38 |
| 61 | +.. gh-issue: 121957 |
| 62 | +.. nonce: FYkcOt |
| 63 | +.. section: Security |
| 64 | +
|
| 65 | +Fixed missing audit events around interactive use of Python, now also |
| 66 | +properly firing for ``python -i``, as well as for ``python -m asyncio``. The |
| 67 | +event in question is ``cpython.run_stdin``. |
| 68 | + |
| 69 | +.. |
| 70 | +
|
| 71 | +.. date: 2024-07-22-13-11-28 |
| 72 | +.. gh-issue: 122133 |
| 73 | +.. nonce: 0mPeta |
| 74 | +.. section: Security |
| 75 | +
|
| 76 | +Authenticate the socket connection for the ``socket.socketpair()`` fallback |
| 77 | +on platforms where ``AF_UNIX`` is not available like Windows. |
| 78 | + |
| 79 | +Patch by Gregory P. Smith < [email protected]> and Seth Larson |
| 80 | + |
| 81 | + |
| 82 | +.. |
| 83 | +
|
| 84 | +.. date: 2024-07-02-13-39-20 |
| 85 | +.. gh-issue: 121285 |
| 86 | +.. nonce: hrl-yI |
| 87 | +.. section: Security |
| 88 | +
|
| 89 | +Remove backtracking from tarfile header parsing for ``hdrcharset``, PAX, and |
| 90 | +GNU sparse headers. |
| 91 | + |
| 92 | +.. |
| 93 | +
|
| 94 | +.. date: 2024-05-01-20-57-09 |
| 95 | +.. gh-issue: 118486 |
| 96 | +.. nonce: K44KJG |
| 97 | +.. section: Security |
| 98 | +
|
| 99 | +:func:`os.mkdir` on Windows now accepts *mode* of ``0o700`` to restrict the |
| 100 | +new directory to the current user. This fixes CVE-2024-4030 affecting |
| 101 | +:func:`tempfile.mkdtemp` in scenarios where the base temporary directory is |
| 102 | +more permissive than the default. |
| 103 | + |
| 104 | +.. |
| 105 | +
|
| 106 | +.. date: 2024-03-27-13-50-02 |
| 107 | +.. gh-issue: 116741 |
| 108 | +.. nonce: ZoGryG |
| 109 | +.. section: Security |
| 110 | +
|
| 111 | +Update bundled libexpat to 2.6.2 |
| 112 | + |
| 113 | +.. |
| 114 | +
|
| 115 | +.. date: 2024-09-04-14-05-02 |
| 116 | +.. gh-issue: 123693 |
| 117 | +.. nonce: dNW1IF |
| 118 | +.. section: Library |
| 119 | +
|
| 120 | +Use platform-agnostic behavior when computing ``zipfile.Path.name``. |
| 121 | + |
| 122 | +.. |
| 123 | +
|
| 124 | +.. date: 2024-08-26-13-45-20 |
| 125 | +.. gh-issue: 123270 |
| 126 | +.. nonce: gXHvNJ |
| 127 | +.. section: Library |
| 128 | +
|
| 129 | +Applied a more surgical fix for malformed payloads in :class:`zipfile.Path` |
| 130 | +causing infinite loops (gh-122905) without breaking contents using |
| 131 | +legitimate characters. |
| 132 | + |
| 133 | +.. |
| 134 | +
|
| 135 | +.. date: 2024-08-16-19-13-21 |
| 136 | +.. gh-issue: 123067 |
| 137 | +.. nonce: Nx9O4R |
| 138 | +.. section: Library |
| 139 | +
|
| 140 | +Fix quadratic complexity in parsing ``"``-quoted cookie values with |
| 141 | +backslashes by :mod:`http.cookies`. |
| 142 | + |
| 143 | +.. |
| 144 | +
|
| 145 | +.. date: 2024-08-11-14-08-04 |
| 146 | +.. gh-issue: 122905 |
| 147 | +.. nonce: 7tDsxA |
| 148 | +.. section: Library |
| 149 | +
|
| 150 | +:class:`zipfile.Path` objects now sanitize names from the zipfile. |
| 151 | + |
| 152 | +.. |
| 153 | +
|
| 154 | +.. date: 2024-07-27-16-10-41 |
| 155 | +.. gh-issue: 121650 |
| 156 | +.. nonce: nf6oc9 |
| 157 | +.. section: Library |
| 158 | +
|
| 159 | +:mod:`email` headers with embedded newlines are now quoted on output. The |
| 160 | +:mod:`~email.generator` will now refuse to serialize (write) headers that |
| 161 | +are unsafely folded or delimited; see |
| 162 | +:attr:`~email.policy.Policy.verify_generated_headers`. (Contributed by Bas |
| 163 | +Bloemsaat and Petr Viktorin in :gh:`121650`.) |
| 164 | + |
| 165 | +.. |
| 166 | +
|
| 167 | +.. date: 2024-03-14-01-38-44 |
| 168 | +.. gh-issue: 113171 |
| 169 | +.. nonce: VFnObz |
| 170 | +.. section: Library |
| 171 | +
|
| 172 | +Fixed various false positives and false negatives in |
| 173 | + |
| 174 | +* :attr:`ipaddress.IPv4Address.is_private` (see these docs for details) |
| 175 | +* :attr:`ipaddress.IPv4Address.is_global` |
| 176 | +* :attr:`ipaddress.IPv6Address.is_private` |
| 177 | +* :attr:`ipaddress.IPv6Address.is_global` |
| 178 | + |
| 179 | +Also in the corresponding :class:`ipaddress.IPv4Network` and |
| 180 | +:class:`ipaddress.IPv6Network` attributes. |
| 181 | + |
| 182 | +.. |
| 183 | +
|
| 184 | +.. date: 2023-10-20-15-28-08 |
| 185 | +.. gh-issue: 102988 |
| 186 | +.. nonce: dStNO7 |
| 187 | +.. section: Library |
| 188 | +
|
| 189 | +:func:`email.utils.getaddresses` and :func:`email.utils.parseaddr` now |
| 190 | +return ``('', '')`` 2-tuples in more situations where invalid email |
| 191 | +addresses are encountered instead of potentially inaccurate values. Add |
| 192 | +optional *strict* parameter to these two functions: use ``strict=False`` to |
| 193 | +get the old behavior, accept malformed inputs. ``getattr(email.utils, |
| 194 | +'supports_strict_parsing', False)`` can be use to check if the *strict* |
| 195 | +paramater is available. Patch by Thomas Dwyer and Victor Stinner to improve |
| 196 | +the CVE-2023-27043 fix. |
| 197 | + |
| 198 | +.. |
| 199 | +
|
| 200 | +.. date: 2019-08-27-01-16-50 |
| 201 | +.. gh-issue: 67693 |
| 202 | +.. nonce: 4NIAiy |
| 203 | +.. section: Library |
| 204 | +
|
| 205 | +Fix :func:`urllib.parse.urlunparse` and :func:`urllib.parse.urlunsplit` for |
| 206 | +URIs with path starting with multiple slashes and no authority. Based on |
| 207 | +patch by Ashwin Ramaswami. |
| 208 | + |
| 209 | +.. |
| 210 | +
|
| 211 | +.. date: 2024-09-04-18-20-11 |
| 212 | +.. gh-issue: 112275 |
| 213 | +.. nonce: W_iMiB |
| 214 | +.. section: Core and Builtins |
| 215 | +
|
| 216 | +A deadlock involving ``pystate.c``'s ``HEAD_LOCK`` in ``posixmodule.c`` at |
| 217 | +fork is now fixed. Patch by ChuBoning based on previous Python 3.12 fix by |
| 218 | +Victor Stinner. |
0 commit comments