Skip to content
Permalink
Branch: 2.7
Commits on Dec 14, 2019
Commits on Dec 3, 2019
  1. [2.7] bpo-38945: UU Encoding: Don't let newline in filename corrupt t…

    stealthcopter authored and gvanrossum committed Dec 3, 2019
    …he output format (GH-17418). (#17452)
    
    (cherry picked from commit a62ad47)
    
    Co-authored-by: Matthew Rollings <1211162+stealthcopter@users.noreply.github.com>
Commits on Dec 1, 2019
  1. document threading.Lock.locked() (GH-17427)

    miss-islington and idomic committed Dec 1, 2019
    (cherry picked from commit fdafa1d)
    
    Co-authored-by: idomic <michael.ido@gmail.com>
Commits on Nov 24, 2019
  1. bpo-38804: Fix REDoS in http.cookiejar (GH-17157) (GH-17345)

    vstinner committed Nov 24, 2019
    The regex http.cookiejar.LOOSE_HTTP_DATE_RE was vulnerable to regular
    expression denial of service (REDoS).
    
    LOOSE_HTTP_DATE_RE.match is called when using http.cookiejar.CookieJar
    to parse Set-Cookie headers returned by a server.
    Processing a response from a malicious HTTP server can lead to extreme
    CPU usage and execution will be blocked for a long time.
    
    The regex contained multiple overlapping \s* capture groups.
    Ignoring the ?-optional capture groups the regex could be simplified to
    
        \d+-\w+-\d+(\s*\s*\s*)$
    
    Therefore, a long sequence of spaces can trigger bad performance.
    
    Matching a malicious string such as
    
        LOOSE_HTTP_DATE_RE.match("1-c-1" + (" " * 2000) + "!")
    
    caused catastrophic backtracking.
    
    The fix removes ambiguity about which \s* should match a particular
    space.
    
    You can create a malicious server which responds with Set-Cookie headers
    to attack all python programs which access it e.g.
    
        from http.server import BaseHTTPRequestHandler, HTTPServer
    
        def make_set_cookie_value(n_spaces):
            spaces = " " * n_spaces
            expiry = f"1-c-1{spaces}!"
            return f"b;Expires={expiry}"
    
        class Handler(BaseHTTPRequestHandler):
            def do_GET(self):
                self.log_request(204)
                self.send_response_only(204)  # Don't bother sending Server and Date
                n_spaces = (
                    int(self.path[1:])  # Can GET e.g. /100 to test shorter sequences
                    if len(self.path) > 1 else
                    65506  # Max header line length 65536
                )
                value = make_set_cookie_value(n_spaces)
                for i in range(99):  # Not necessary, but we can have up to 100 header lines
                    self.send_header("Set-Cookie", value)
                self.end_headers()
    
        if __name__ == "__main__":
            HTTPServer(("", 44020), Handler).serve_forever()
    
    This server returns 99 Set-Cookie headers. Each has 65506 spaces.
    Extracting the cookies will pretty much never complete.
    
    Vulnerable client using the example at the bottom of
    https://docs.python.org/3/library/http.cookiejar.html :
    
        import http.cookiejar, urllib.request
        cj = http.cookiejar.CookieJar()
        opener = urllib.request.build_opener(urllib.request.HTTPCookieProcessor(cj))
        r = opener.open("http://localhost:44020/")
    
    The popular requests library was also vulnerable without any additional
    options (as it uses http.cookiejar by default):
    
        import requests
        requests.get("http://localhost:44020/")
    
    * Regression test for http.cookiejar REDoS
    
    If we regress, this test will take a very long time.
    
    * Improve performance of http.cookiejar.ISO_DATE_RE
    
    A string like
    
    "444444" + (" " * 2000) + "A"
    
    could cause poor performance due to the 2 overlapping \s* groups,
    although this is not as serious as the REDoS in LOOSE_HTTP_DATE_RE was.
    
    (cherry picked from commit 1b779bf)
Commits on Nov 7, 2019
  1. [2.7] bpo-38730: Fix -Wstringop-truncation warnings. (GH-17075)

    benjaminp committed Nov 7, 2019
  2. bpo-37731: Squish another _POSIX_C_SOURCE redefinition problem in exp…

    benjaminp committed Nov 7, 2019
    …at. (GH-17077)
  3. bpo-37731: Reorder includes in xmltok.c to avoid redefinition of _POS…

    miss-islington and pablogsal committed Nov 7, 2019
    …IX_C_SOURCE (GH-16733)
    
    (cherry picked from commit 8177404)
    
    Co-authored-by: Pablo Galindo <Pablogsal@gmail.com>
Commits on Oct 26, 2019
  1. bpo-38557: Improve documentation for list and tuple C API. (GH-16925)

    miss-islington and serhiy-storchaka committed Oct 26, 2019
    (cherry picked from commit d898d20)
    
    Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
  2. [2.7] bpo-38535: Fix positions for AST nodes for calls without argume…

    serhiy-storchaka committed Oct 26, 2019
    …nts in decorators. (GH-16861). (GH-16931)
    
    (cherry picked from commit 26ae9f6)
Commits on Oct 23, 2019
  1. Update URL in macOS installer copy of license (GH-16905)

    miss-islington and ned-deily committed Oct 23, 2019
    (cherry picked from commit 01659ca)
    
    Co-authored-by: Ned Deily <nad@python.org>
  2. bpo-37025: AddRefActCtx() shouldn't be checked for failure (GH-16897)

    ZackerySpytz authored and zooba committed Oct 23, 2019
    AddRefActCtx() does not return a value.
Commits on Oct 22, 2019
  1. Fix Zope URL (GH-16880)

    miss-islington and aeros committed Oct 22, 2019
    (cherry picked from commit dfe726b)
    
    Co-authored-by: Kyle Stanley <aeros167@gmail.com>
Commits on Oct 21, 2019
  1. [2.7] bpo-38540: Fix possible leak in PyArg_Parse for "es#" and "et#". (

    serhiy-storchaka committed Oct 21, 2019
    GH-16869). (GH-16877)
    
    (cherry picked from commit 5bc6a7c)
Commits on Oct 20, 2019
  1. Work around Path.glob() issue when creating nuget package (GH-16855)

    zooba committed Oct 20, 2019
Commits on Oct 19, 2019
  1. 2.2.17+

    benjaminp committed Oct 19, 2019
  2. Empty blurb file for 2.7.17.

    benjaminp committed Oct 19, 2019
  3. Update doc switcher list for 3.8.0 (GH-16809)

    miss-islington and ned-deily committed Oct 19, 2019
    (cherry picked from commit 3f36043)
    
    Co-authored-by: Ned Deily <nad@python.org>
  4. Update build docs for macOS (GH-16844)

    ned-deily committed Oct 19, 2019
Commits on Oct 18, 2019
  1. bpo-32758: Warn that ast.parse() and ast.literal_eval() can segfault …

    2 people authored and serhiy-storchaka committed Oct 18, 2019
    …the interpreter (GH-5960) (GH-16565)
    
    (cherry picked from commit 7a7f100)
    
    Co-authored-by: Brett Cannon <brettcannon@users.noreply.github.com>
  2. bpo-32758: Warn that compile() can crash when compiling to an AST obj…

    2 people authored and serhiy-storchaka committed Oct 18, 2019
    …ect (GH-6043) (GH-16566)
    
    (cherry picked from commit f7a6ff6)
    
    Co-authored-by: Brett Cannon <brettcannon@users.noreply.github.com>
Commits on Oct 14, 2019
  1. Doc: 3.8 is now stable. (GH-16790) (GH-16794)

    2 people authored and ned-deily committed Oct 14, 2019
    (cherry picked from commit 4504b45)
    
    Co-authored-by: Julien Palard <julien@palard.fr>
  2. [2.7] Update macOS installer display files for 2.7.17 (GH-16768)

    ned-deily committed Oct 14, 2019
Commits on Oct 8, 2019
  1. [2.7] bpo-31036: Allow sphinx and blurb to be found automatically (GH…

    benjaminp and ned-deily committed Oct 8, 2019
    …-16638)
    
    Rather than requiring the path to blurb and/or sphinx-build to be specified to the make rule, enhance the Doc/Makefile to look for each first in a virtual environment created by make venv and, if not found, look on the normal process PATH. This allows the Doc/Makefile to take advantage of an installed spinx-build or blurb and, thus, do the right thing most of the time. Also, make the directory for the venv be configurable and document the `make venv` target..
    (cherry picked from commit 590665c)
    
    Co-authored-by: Ned Deily <nad@python.org>
  2. bpo-35036: Remove empty log line in the suspicious.py tool (GH-10024)

    miss-islington and tirkarthi committed Oct 8, 2019
    Previous to commit ee171a2 the logline was working because of self.info() (now
    deprecated) defaults to an empty message.
    (cherry picked from commit c3f52a5)
    
    Co-authored-by: Xtreak <tirkarthi@users.noreply.github.com>
  3. bpo-31589 : Build PDF using xelatex for better UTF8 support. (GH-3940)

    miss-islington and JulienPalard committed Oct 8, 2019
    Also addresses doc build failures documented in bpo-32200.
    (cherry picked from commit 7324b5c)
    
    Co-authored-by: Julien Palard <julien@palard.fr>
  4. [2.7] Stop using deprecated logging API in Sphinx suspicious checker (G…

    benjaminp and pablogsal committed Oct 8, 2019
    …H-16635)
    
    (cherry picked from commit ee171a2)
    
    Co-authored-by: Pablo Galindo <Pablogsal@gmail.com>
  5. Update macOS installer displays for 2.7.17rc1 (#16634)

    ned-deily committed Oct 8, 2019
  6. Bump version to 2.7.17rc1.

    benjaminp committed Oct 8, 2019
  7. [2.7] bpo-38216, bpo-36274: Allow subclasses to separately override v…

    jaraco authored and benjaminp committed Oct 8, 2019
    …alidation and encoding behavior (GH-16476)
    
    Backporting this change, I observe a couple of things:
    
    1. The _encode_request call is no longer meaningful because the request construction will implicitly encode the request using the default encoding when the format string is used (request = '%s %s %s'...). In order to keep the code as consistent as possible, I decided to include the call as a pass-through. I'd be just as happy to remove it entirely, but I'll leave that up to the reviewer to decide. It's okay that this functionality is disabled on Python 2 because this functionality was mainly around bpo-36274, which was mainly a concern with the transition to Python 3.
    2. Because _encode_request is no longer meaningful, neither is the test for it, so I've removed that test. Therefore, the meaningful part of this test is that for bpo-38216, adding a (underscore-protected) hook to customize/disable validation.
    
    (cherry picked from commit 7774d78)
    
    Co-authored-by: Jason R. Coombs <jaraco@jaraco.com>
  8. [2.7] bpo-37664: Update ensurepip bundled wheels, again (GH-16633)

    benjaminp and pradyunsg committed Oct 8, 2019
    (cherry picked from commit 10c452b)
    
    Co-authored-by: Pradyun Gedam <pradyunsg@gmail.com>
Commits on Oct 3, 2019
  1. bpo-38106: Fix race in pthread PyThread_release_lock() (GH-16047)

    2 people authored and vstinner committed Oct 3, 2019
    Fix race in PyThread_release_lock that was leading to memory corruption and
    deadlocks. The fix applies to POSIX systems where Python locks are implemented
    with mutex and condition variable because POSIX semaphores are either not
    provided, or are known to be broken. One particular example of such system is
    macOS.
    
    On Darwin, even though this is considered as POSIX, Python uses
    mutex+condition variable to implement its lock, and, as of 2019-08-28, Py2.7
    implementation, even though similar issue was fixed for Py3 in 2012, contains
    synchronization bug: the condition is signalled after mutex unlock while the
    correct protocol is to signal condition from under mutex:
    
      https://github.com/python/cpython/blob/v2.7.16-127-g0229b56d8c0/Python/thread_pthread.h#L486-L506
      187aa54 (py3 fix)
    
    PyPy has the same bug for both pypy2 and pypy3:
    
      https://bitbucket.org/pypy/pypy/src/578667b3fef9/rpython/translator/c/src/thread_pthread.c#lines-443:465
      https://bitbucket.org/pypy/pypy/src/5b42890d48c3/rpython/translator/c/src/thread_pthread.c#lines-443:465
    
    Signalling condition outside of corresponding mutex is considered OK by
    POSIX, but in Python context it can lead to at least memory corruption if we
    consider the whole lifetime of python level lock. For example the following
    logical scenario:
    
          T1                                          T2
    
      sema = Lock()
      sema.acquire()
    
                                                  sema.release()
    
      sema.acquire()
      free(sema)
    
      ...
    
    can translate to the next C-level calls:
    
          T1                                          T2
    
      # sema = Lock()
      sema = malloc(...)
      sema.locked = 0
      pthread_mutex_init(&sema.mut)
      pthread_cond_init (&sema.lock_released)
    
      # sema.acquire()
      pthread_mutex_lock(&sema.mut)
      # sees sema.locked == 0
      sema.locked = 1
      pthread_mutex_unlock(&sema.mut)
    
                                                  # sema.release()
                                                  pthread_mutex_lock(&sema.mut)
                                                  sema.locked = 0
                                                  pthread_mutex_unlock(&sema.mut)
    
                          # OS scheduler gets in and relinquishes control from T2
                          # to another process
                                                  ...
    
      # second sema.acquire()
      pthread_mutex_lock(&sema.mut)
      # sees sema.locked == 0
      sema.locked = 1
      pthread_mutex_unlock(&sema.mut)
    
      # free(sema)
      pthread_mutex_destroy(&sema.mut)
      pthread_cond_destroy (&sema.lock_released)
      free(sema)
    
      # ...
      e.g. malloc() which returns memory where sema was
    
                                                  ...
                          # OS scheduler returns control to T2
                          # sema.release() continues
                          #
                          # BUT sema was already freed and writing to anywhere
                          # inside sema block CORRUPTS MEMORY. In particular if
                          # _another_ python-level lock was allocated where sema
                          # block was, writing into the memory can have effect on
                          # further synchronization correctness and in particular
                          # lead to deadlock on lock that was next allocated.
                                                  pthread_cond_signal(&sema.lock_released)
    
    Note that T2.pthread_cond_signal(&sema.lock_released) CORRUPTS MEMORY as it
    is called when sema memory was already freed and is potentially
    reallocated for another object.
    
    The fix is to move pthread_cond_signal to be done under corresponding mutex:
    
      # sema.release()
      pthread_mutex_lock(&sema.mut)
      sema.locked = 0
      pthread_cond_signal(&sema.lock_released)
      pthread_mutex_unlock(&sema.mut)
    
    To do so this patch cherry-picks thread_pthread.h part of the following 3.2 commit:
    
    commit 187aa54
    Author: Kristján Valur Jónsson <kristjan@ccpgames.com>
    Date:   Tue Jun 5 22:17:42 2012 +0000
    
        Signal condition variables with the mutex held.  Destroy condition variables
        before their mutexes.
    
     Python/ceval_gil.h      |  9 +++++----
     Python/thread_pthread.h | 15 +++++++++------
     2 files changed, 14 insertions(+), 10 deletions(-)
    
    (ceval_gil.h is Python3 specific and does not apply to Python2.7)
    
    The bug was there since 1994 - since at least [1]. It was discussed in 2001
    with original code author[2], but the code was still considered to be
    race-free. In 2010 the place where pthread_cond_signal should be - before or
    after pthread_mutex_unlock - was discussed with the rationale to avoid
    threads bouncing[3,4,5], and in 2012 pthread_cond_signal was moved to be
    called from under mutex, but only for CPython3[6,7].
    
    In 2019 the bug was (re-)discovered while testing Pygolang[8] on macOS with
    CPython2 and PyPy2 and PyPy3.
    
    [1] 2c8cb9f
    [2] https://bugs.python.org/issue433625
    [3] https://bugs.python.org/issue8299#msg103224
    [4] https://bugs.python.org/issue8410#msg103313
    [5] https://bugs.python.org/issue8411#msg113301
    [6] https://bugs.python.org/issue15038#msg163187
    [7] 187aa54
    [8] https://pypi.org/project/pygolang
    
    (cherry picked from commit 187aa54)
    
    Co-Authored-By: Kristján Valur Jónsson <kristjan@ccpgames.com>
Commits on Oct 2, 2019
  1. [2.7] bpo-38338, test.pythoninfo: add more ssl infos (GH-16543)

    vstinner committed Oct 2, 2019
    test.pythoninfo now logs environment variables used by OpenSSL and
    Python ssl modules, and logs attributes of 3 SSL contexts
    (SSLContext, default HTTPS context, stdlib context).
    
    (cherry picked from commit 1df1c2f)
Older
You can’t perform that action at this time.