Commits
3.9
Name already in use
Commits on Nov 6, 2023
-
[3.9] gh-101180: Fix a bug where iso2022_jp_3 and iso2022_jp_2004 cod…
…ecs read out of bounds (gh-111695) (gh-111780) (cherry picked from commit c8faa35) Co-authored-by: Masayuki Moriyama <[email protected]>
Commits on Sep 6, 2023
-
[3.9] gh-109002: Ensure only one wheel for each vendored package (GH-…
…109003) (#109008) Output with one wheel: ``` ❯ GITHUB_ACTIONS=true ./Tools/build/verify_ensurepip_wheels.py Verifying checksum for /Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-23.2.1-py3-none-any.whl. Expected digest: 7ccf472345f20d35bdc9d1841ff5f313260c2c33fe417f48c30ac46cccabf5be Actual digest: 7ccf472345f20d35bdc9d1841ff5f313260c2c33fe417f48c30ac46cccabf5be ::notice file=/Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-23.2.1-py3-none-any.whl::Successfully verified the checksum of the pip wheel. ``` Output with two wheels: ``` ❯ GITHUB_ACTIONS=true ./Tools/build/verify_ensurepip_wheels.py ::error file=/Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-22.0.4-py3-none-any.whl::Found more than one wheel for package pip. ::error file=/Volumes/RAMDisk/cpython/Lib/ensurepip/_bundled/pip-23.2.1-py3-none-any.whl::Found more than one wheel for package pip. ``` Output without wheels: ``` ❯ GITHUB_ACTIONS=true ./Tools/build/verify_ensurepip_wheels.py ::error file=::Could not find a pip wheel on disk. ``` (cherry picked from commit f8a0479) Co-authored-by: Łukasz Langa <[email protected]>
Commits on Sep 5, 2023
-
[3.9] CI: Bump GitHub Actions (GH-108879) (#108893)
Co-authored-by: Łukasz Langa <[email protected]>
-
[3.9] [3.10] Add a dummy .rtfd.yml file to silence invalid failing we…
…bhooks (GH-108908) (#108925) (cherry picked from commit 5970435) Co-authored-by: Łukasz Langa <[email protected]> Co-authored-by: Alex Waygood <[email protected]>
Commits on Aug 24, 2023
-
-
-
-
[3.9] gh-108342: Make ssl TestPreHandshakeClose more reliable (GH-108370
) (#108407) * In preauth tests of test_ssl, explicitly break reference cycles invoving SingleConnectionTestServerThread to make sure that the thread is deleted. Otherwise, the test marks the environment as altered because the threading module sees a "dangling thread" (SingleConnectionTestServerThread). This test leak was introduced by the test added for the fix of issue gh-108310. * Use support.SHORT_TIMEOUT instead of hardcoded 1.0 or 2.0 seconds timeout. * SingleConnectionTestServerThread.run() catchs TimeoutError * Fix a race condition (missing synchronization) in test_preauth_data_to_tls_client(): the server now waits until the client connect() completed in call_after_accept(). * test_https_client_non_tls_response_ignored() calls server.join() explicitly. * Replace "localhost" with server.listener.getsockname()[0]. (cherry picked from commit 592bacb) Co-authored-by: Victor Stinner <[email protected]>
Commits on Aug 23, 2023
-
[3.9] gh-108342: Break ref cycle in SSLSocket._create() exc (GH-108344)…
… (#108351) Explicitly break a reference cycle when SSLSocket._create() raises an exception. Clear the variable storing the exception, since the exception traceback contains the variables and so creates a reference cycle. This test leak was introduced by the test added for the fix of GH-108310. (cherry picked from commit 64f9935) Co-authored-by: Victor Stinner <[email protected]>
Commits on Aug 22, 2023
-
[3.9] gh-107845: Fix symlink handling for tarfile.data_filter (GH-107846
) (#108274) (cherry picked from commit acbd3f9) Co-authored-by: Petr Viktorin <[email protected]> Co-authored-by: Victor Stinner <[email protected]> Co-authored-by: Lumír 'Frenzy' Balhar <[email protected]>
-
[3.9] gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-cl…
…ose flaw (#108320) gh-108310: Fix CVE-2023-40217: Check for & avoid the ssl pre-close flaw Instances of `ssl.SSLSocket` were vulnerable to a bypass of the TLS handshake and included protections (like certificate verification) and treating sent unencrypted data as if it were post-handshake TLS encrypted data. The vulnerability is caused when a socket is connected, data is sent by the malicious peer and stored in a buffer, and then the malicious peer closes the socket within a small timing window before the other peers’ TLS handshake can begin. After this sequence of events the closed socket will not immediately attempt a TLS handshake due to not being connected but will also allow the buffered data to be read as if a successful TLS handshake had occurred. Co-authored-by: Gregory P. Smith [Google LLC] <[email protected]>
Commits on Jul 5, 2023
-
[3.9] CI: Bump macOS build to use OpenSSL v3.0 (GH-105538) (#105871)
(cherry picked from commit 34e93d3) Co-authored-by: Erlend E. Aasland <[email protected]>
-
[3.9] [3.11] Add single value
agen.athrow(value)
signature to the 3…….11 docs gh-105269 (GH-105468) (#105477) (cherry picked from commit acf3916) Co-authored-by: Federico Caselli <[email protected]>
Commits on Jun 6, 2023
Commits on Jun 5, 2023
-
[3.9] gh-105184: document that marshal functions can fail and need to…
… be checked with PyErr_Occurred (GH-105185) (#105221) (cherry picked from commit ee26ca1) Co-authored-by: Irit Katriel <[email protected]>
-
[3.9] gh-103142: Upgrade binary builds and CI to OpenSSL 1.1.1u (GH-1…
…05174) (GH-105200) (#105205) Upgrade builds to OpenSSL 1.1.1u. Also updates _ssl_data_111.h from OpenSSL 1.1.1u, _ssl_data_300.h from 3.0.9. Manual edits to the _ssl_data_300.h file prevent it from removing any existing definitions in case those exist in some peoples builds and were important (avoiding regressions during backporting). (cherry picked from commit ede89af) Co-authored-by: Ned Deily <[email protected]>
-
Commits on May 22, 2023
-
[3.9] gh-102153: Start stripping C0 control and space chars in `urlsp…
…lit` (GH-102508) (GH-104575) (GH-104592) (#104593) gh-102153: Start stripping C0 control and space chars in `urlsplit` (GH-102508) `urllib.parse.urlsplit` has already been respecting the WHATWG spec a bit GH-25595. This adds more sanitizing to respect the "Remove any leading C0 control or space from input" [rule](https://url.spec.whatwg.org/GH-url-parsing:~:text=Remove%20any%20leading%20and%20trailing%20C0%20control%20or%20space%20from%20input.) in response to [CVE-2023-24329](https://nvd.nist.gov/vuln/detail/CVE-2023-24329). I simplified the docs by eliding the state of the world explanatory paragraph in this security release only backport. (people will see that in the mainline /3/ docs) (cherry picked from commit 2f630e1) (cherry picked from commit 610cc0a) (cherry picked from commit f48a96a) Co-authored-by: Illia Volochii <[email protected]> Co-authored-by: Gregory P. Smith [Google] <[email protected]>
-
[3.9] gh-99889: Fix directory traversal security flaw in uu.decode() (G…
…H-104096) (#104331) (cherry picked from commit 0aeda29) Co-authored-by: Sam Carroll <[email protected]>
-
[3.9] gh-104049: do not expose on-disk location from SimpleHTTPReques…
…tHandler (GH-104067) (#104120) Do not expose the local server's on-disk location from `SimpleHTTPRequestHandler` when generating a directory index. (unnecessary information disclosure) (cherry picked from commit c7c3a60) Co-authored-by: Ethan Furman <[email protected]> Co-authored-by: Gregory P. Smith <[email protected]> Co-authored-by: Jelle Zijlstra <[email protected]>
-
[3.9] gh-103935: Use
io.open_code()
when executing code in trace an……d profile modules (GH-103947) (#103953) Co-authored-by: Tian Gao <[email protected]>
Commits on Mar 28, 2023
Commits on Mar 13, 2023
-
[3.9] gh-102627: Replace address pointing toward malicious web page (G…
…H-102630) (GH-102666) (cherry picked from commit 61479d4) Co-authored-by: Blind4Basics <[email protected]> Co-authored-by: C.A.M. Gerlach <[email protected]> Co-authored-by: Hugo van Kemenade <[email protected]>
Commits on Mar 7, 2023
-
[3.9] gh-101726: Update the OpenSSL version to 1.1.1t (GH-101727) (GH…
…-101751) Fixes CVE-2023-0286 (High) and a couple of Medium security issues. https://www.openssl.org/news/secadv/20230207.txt Co-authored-by: Gregory P. Smith <[email protected]> Co-authored-by: Ned Deily <[email protected]>
Commits on Feb 21, 2023
Commits on Feb 9, 2023
-
[3.9] gh-101283: Improved fallback logic for subprocess with shell=Tr…
…ue on Windows (GH-101286) (#101709) Co-authored-by: Oleg Iarygin <[email protected]> Co-authored-by: Steve Dower <[email protected]>
Commits on Jan 30, 2023
-
gh-101422: (docs) TarFile default errorlevel argument is 1, not 0 (GH…
…-101424) (cherry picked from commit ea23271) Co-authored-by: Owain Davies <[email protected]>
Commits on Jan 21, 2023
-
[3.9] Bump Azure Pipelines to ubuntu-22.04 (GH-101089) (#101214)
(cherry picked from commit c22a55c) Co-authored-by: Hugo van Kemenade <[email protected]>