Skip to content

Commits

Permalink
3.6
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

Commits on Dec 28, 2021

  1. Copy the full SHA
    8d999cb View commit details
    Browse the repository at this point in the history

Commits on Sep 4, 2021

  1. Post release updates

    ned-deily committed Sep 4, 2021
    Copy the full SHA
    2c56c97 View commit details
    Browse the repository at this point in the history
  2. 3.6.15

    ned-deily committed Sep 4, 2021
    Copy the full SHA
    b74b1f3 View commit details
    Browse the repository at this point in the history

Commits on Aug 31, 2021

  1. [3.6] bpo-44394: Update libexpat copy to 2.4.1 (GH-26945) (GH-28042) (G…

    …H-28080)
    
    Update the vendored copy of libexpat to 2.4.1 (from 2.2.8) to get the
    fix for the CVE-2013-0340 "Billion Laughs" vulnerability. This copy
    is most used on Windows and macOS.
    
    Co-authored-by: Victor Stinner <vstinner@python.org>
    
    Co-authored-by: Łukasz Langa <lukasz@langa.pl>.
    (cherry picked from commit 3fc5d84)
    ned-deily committed Aug 31, 2021
    Copy the full SHA
    910886a View commit details
    Browse the repository at this point in the history
  2. bpo-38965: Fix faulthandler._stack_overflow() on GCC 10 (GH-17467) (G…

    …H-28079)
    
    Use the "volatile" keyword to prevent tail call optimization
    on any compiler, rather than relying on compiler specific pragma.
    (cherry picked from commit 8b78796)
    
    Co-authored-by: Victor Stinner <vstinner@python.org>
    (cherry picked from commit 5044c88)
    
    Co-authored-by: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
    miss-islington committed Aug 31, 2021
    Copy the full SHA
    8934bb0 View commit details
    Browse the repository at this point in the history

Commits on Aug 30, 2021

  1. [3.6] bpo-43124: Fix smtplib multiple CRLF injection (GH-25987) (GH-2…

    …8038)
    
    Co-authored-by: Miguel Brito <5544985+miguendes@users.noreply.github.com>
    
    Co-authored-by: Łukasz Langa <lukasz@langa.pl>
    (cherry picked from commit 0897253)
    miss-islington committed Aug 30, 2021
    Copy the full SHA
    29d97d1 View commit details
    Browse the repository at this point in the history
  2. bpo-45001: Make email date parsing more robust against malformed input (

    GH-27946) (GH-27976)
    
    Various date parsing utilities in the email module, such as
    email.utils.parsedate(), are supposed to gracefully handle invalid
    input, typically by raising an appropriate exception or by returning
    None.
    
    The internal email._parseaddr._parsedate_tz() helper used by some of
    these date parsing routines tries to be robust against malformed input,
    but unfortunately it can still crash ungracefully when a non-empty but
    whitespace-only input is passed. This manifests as an unexpected
    IndexError.
    
    In practice, this can happen when parsing an email with only a newline
    inside a ‘Date:’ header, which unfortunately happens occasionally in the
    real world.
    
    Here's a minimal example:
    
        $ python
        Python 3.9.6 (default, Jun 30 2021, 10:22:16)
        [GCC 11.1.0] on linux
        Type "help", "copyright", "credits" or "license" for more information.
        >>> import email.utils
        >>> email.utils.parsedate('foo')
        >>> email.utils.parsedate(' ')
        Traceback (most recent call last):
          File "<stdin>", line 1, in <module>
          File "/usr/lib/python3.9/email/_parseaddr.py", line 176, in parsedate
            t = parsedate_tz(data)
          File "/usr/lib/python3.9/email/_parseaddr.py", line 50, in parsedate_tz
            res = _parsedate_tz(data)
          File "/usr/lib/python3.9/email/_parseaddr.py", line 72, in _parsedate_tz
            if data[0].endswith(',') or data[0].lower() in _daynames:
        IndexError: list index out of range
    
    The fix is rather straight-forward: guard against empty lists, after
    splitting on whitespace, but before accessing the first element.
    (cherry picked from commit 989f6a3)
    
    Co-authored-by: wouter bolsterlee <wouter@bolsterl.ee>
    miss-islington and wbolster committed Aug 30, 2021
    Copy the full SHA
    da9d6c5 View commit details
    Browse the repository at this point in the history

Commits on Jul 5, 2021

  1. Copy the full SHA
    0a0a135 View commit details
    Browse the repository at this point in the history

Commits on Jun 28, 2021

  1. Post release updates

    ned-deily committed Jun 28, 2021
    Copy the full SHA
    af1e6b9 View commit details
    Browse the repository at this point in the history
  2. 3.6.14

    ned-deily committed Jun 28, 2021
    Copy the full SHA
    9a0099d View commit details
    Browse the repository at this point in the history

Commits on Jun 3, 2021

  1. bpo-44022: Improve the regression test. (GH-26503) (GH-26508)

    It wasn't actually detecting the regression due to the
    assertion being too lenient.
    (cherry picked from commit e60ab84)
    
    Co-authored-by: Gregory P. Smith <greg@krypto.org>
    miss-islington and gpshead committed Jun 3, 2021
    Copy the full SHA
    1b6f4e5 View commit details
    Browse the repository at this point in the history

Commits on May 20, 2021

  1. [3.6] bpo-43882 - Mention urllib.parse changes in Whats New section f…

    …or 3.6.14 (GH-26268)
    
    Co-authored-by: Gregory P. Smith <greg@krypto.org>
    orsenthil and gpshead committed May 20, 2021
    Copy the full SHA
    6f743e7 View commit details
    Browse the repository at this point in the history

Commits on May 6, 2021

  1. bpo-44022: Fix http client infinite line reading (DoS) after a HTTP 1…

    …00 Continue (GH-25916) (GH-25935)
    
    Fixes http.client potential denial of service where it could get stuck reading lines from a malicious server after a 100 Continue response.
    
    Co-authored-by: Gregory P. Smith <greg@krypto.org>
    (cherry picked from commit 47895e3)
    
    Co-authored-by: Gen Xu <xgbarry@gmail.com>
    miss-islington and gen-xu committed May 6, 2021
    Copy the full SHA
    f68d2d6 View commit details
    Browse the repository at this point in the history
  2. bpo-43075: Fix ReDoS in urllib AbstractBasicAuthHandler (GH-24391) (G…

    …H-25250)
    
    Fix Regular Expression Denial of Service (ReDoS) vulnerability in
    urllib.request.AbstractBasicAuthHandler. The ReDoS-vulnerable regex
    has quadratic worst-case complexity and it allows cause a denial of
    service when identifying crafted invalid RFCs. This ReDoS issue is on
    the client side and needs remote attackers to control the HTTP server.
    (cherry picked from commit 7215d1a)
    
    Co-authored-by: Yeting Li <liyt@ios.ac.cn>
    miss-islington and yetingli committed May 6, 2021
    Copy the full SHA
    3fbe961 View commit details
    Browse the repository at this point in the history
  3. [3.6] bpo-43882 - urllib.parse should sanitize urls containing ASCII …

    …newline and tabs (GH-25924)
    
    Co-authored-by: Gregory P. Smith <greg@krypto.org>
    Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
    (cherry picked from commit 76cd81d)
    Co-authored-by: Senthil Kumaran <senthil@uthcode.com>
    (cherry picked from commit 515a7bc)
    
    Co-authored-by: Miss Islington (bot) <31488909+miss-islington@users.noreply.github.com>
    miss-islington committed May 6, 2021
    Copy the full SHA
    6c472d3 View commit details
    Browse the repository at this point in the history

Commits on Mar 29, 2021

  1. bpo-42988: Remove the pydoc getfile feature (GH-25015) (GH-25067)

    CVE-2021-3426: Remove the "getfile" feature of the pydoc module which
    could be abused to read arbitrary files on the disk (directory
    traversal vulnerability). Moreover, even source code of Python
    modules can contain sensitive data like passwords. Vulnerability
    reported by David Schwörer.
    (cherry picked from commit 9b99947)
    
    Co-authored-by: Victor Stinner <vstinner@python.org>
    miss-islington and vstinner committed Mar 29, 2021
    Copy the full SHA
    5b1e502 View commit details
    Browse the repository at this point in the history

Commits on Mar 16, 2021

  1. [3.6] bpo-43285 Make ftplib not trust the PASV response. (GH-24838) (G…

    …H-24881) (GH-24882)
    
    The IPv4 address value returned from the server in response to the PASV command
    should not be trusted.  This prevents a malicious FTP server from using the
    response to probe IPv4 address and port combinations on the client network.
    
    Instead of using the returned address, we use the IP address we're
    already connected to.  This is the strategy other ftp clients adopted,
    and matches the only strategy available for the modern IPv6 EPSV command
    where the server response must return a port number and nothing else.
    
    For the rare user who _wants_ this ugly behavior, set a `trust_server_pasv_ipv4_address`
    attribute on your `ftplib.FTP` instance to True..
    (cherry picked from commit 0ab152c)
    
    Co-authored-by: Gregory P. Smith <greg@krypto.org>
    (cherry picked from commit 664d1d1)
    miss-islington committed Mar 16, 2021
    Copy the full SHA
    4134f15 View commit details
    Browse the repository at this point in the history

Commits on Feb 16, 2021

  1. Post release updates

    ned-deily committed Feb 16, 2021
    Copy the full SHA
    a64de63 View commit details
    Browse the repository at this point in the history
  2. 3.6.13

    ned-deily committed Feb 16, 2021
    Copy the full SHA
    aa73e17 View commit details
    Browse the repository at this point in the history

Commits on Feb 15, 2021

  1. [3.6] bpo-42967: only use '&' as a query string separator (GH-24297) (G…

    …H-24532)
    
    bpo-42967: [security] Address a web cache-poisoning issue reported in
    urllib.parse.parse_qsl().
    
    urllib.parse will only us "&" as query string separator by default
    instead of both ";" and "&" as allowed in earlier versions. An optional
    argument seperator with default value "&" is added to specify the
    separator.
    
    Co-authored-by: Éric Araujo <merwok@netwok.org>
    Co-authored-by: Ken Jin <28750310+Fidget-Spinner@users.noreply.github.com>
    Co-authored-by: Adam Goldschmidt <adamgold7@gmail.com>
    4 people committed Feb 15, 2021
    Copy the full SHA
    5c17dfc View commit details
    Browse the repository at this point in the history

Commits on Jan 18, 2021

  1. [3.6] closes bpo-42938: Replace snprintf with Python unicode formatti…

    …ng in ctypes param reprs. (GH-24250)
    
    (cherry picked from commit 916610e)
    
    Co-authored-by: Benjamin Peterson <benjamin@python.org>
    benjaminp committed Jan 18, 2021
    Copy the full SHA
    34df10a View commit details
    Browse the repository at this point in the history

Commits on Jan 2, 2021

  1. [3.6] Bring Python into the new year. (GH-24036). (GH-24054)

    (cherry picked from commit de6f20a)
    
    Co-authored-by: Dong-hee Na <donghee.na@python.org>
    corona10 committed Jan 2, 2021
    Copy the full SHA
    415c4a1 View commit details
    Browse the repository at this point in the history

Commits on Jan 1, 2021

  1. bpo-42794: Update test_nntplib to use offical group name for testing (G…

    …H-24037) (GH-24042)
    
    (cherry picked from commit ec31653)
    
    Co-authored-by: Dong-hee Na <donghee.na@python.org>
    miss-islington and corona10 committed Jan 1, 2021
    Copy the full SHA
    546baba View commit details
    Browse the repository at this point in the history

Commits on Dec 14, 2020

  1. bpo-40791: Make compare_digest more constant-time. (GH-23438) (GH-23767)

    The existing volatile `left`/`right` pointers guarantee that the reads will all occur, but does not guarantee that they will be _used_. So a compiler can still short-circuit the loop, saving e.g. the overhead of doing the xors and especially the overhead of the data dependency between `result` and the reads. That would change performance depending on where the first unequal byte occurs. This change removes that optimization.
    
    (This is change GH-1 from https://bugs.python.org/issue40791 .)
    (cherry picked from commit 3172936)
    
    Co-authored-by: Devin Jeanpierre <jeanpierreda@google.com>
    miss-islington and ssbr committed Dec 14, 2020
    Copy the full SHA
    8bef9eb View commit details
    Browse the repository at this point in the history

Commits on Nov 10, 2020

  1. bpo-35560: Remove assertion from format(float, "n") (GH-11288) (GH-23231

    )
    
    Fix an assertion error in format() in debug build for floating point
    formatting with "n" format, zero padding and small width. Release build is
    not impacted. Patch by Karthikeyan Singaravelan.
    (cherry picked from commit 3f7983a)
    
    Co-authored-by: Xtreak <tir.karthi@gmail.com>
    miss-islington and tirkarthi committed Nov 10, 2020
    Copy the full SHA
    dae5d72 View commit details
    Browse the repository at this point in the history
  2. [3.6] bpo-42103: Improve validation of Plist files. (GH-22882) (GH-23118

    )
    
    * Prevent some possible DoS attacks via providing invalid Plist files
      with extremely large number of objects or collection sizes.
    * Raise InvalidFileException for too large bytes and string size instead of returning garbage.
    * Raise InvalidFileException instead of ValueError for specific invalid datetime (NaN).
    * Raise InvalidFileException instead of TypeError for non-hashable dict keys.
    * Add more tests for invalid Plist files..
    (cherry picked from commit 34637a0)
    
    Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
    serhiy-storchaka committed Nov 10, 2020
    Copy the full SHA
    a63234c View commit details
    Browse the repository at this point in the history

Commits on Oct 22, 2020

  1. Copy the full SHA
    a75c4c9 View commit details
    Browse the repository at this point in the history

Commits on Oct 20, 2020

  1. bpo-41944: No longer call eval() on content received via HTTP in the …

    …CJK codec tests (GH-22566) (GH-22579)
    
    (cherry picked from commit 2ef5caa)
    
    Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
    miss-islington and serhiy-storchaka committed Oct 20, 2020
    Copy the full SHA
    e912e94 View commit details
    Browse the repository at this point in the history
  2. bpo-42051: Reject XML entity declarations in plist files (GH-22760) (G…

    …H-22801) (GH-22804)
    
    Co-authored-by: Ronald Oussoren <ronaldoussoren@mac.com>
    (cherry picked from commit e512bc7)
    
    Co-authored-by: Ned Deily <nad@python.org>
    miss-islington and ned-deily committed Oct 20, 2020
    Copy the full SHA
    a158fb9 View commit details
    Browse the repository at this point in the history
  3. Copy the full SHA
    a69002c View commit details
    Browse the repository at this point in the history

Commits on Aug 17, 2020

  1. Post release updates

    ned-deily committed Aug 17, 2020
    Copy the full SHA
    aed2648 View commit details
    Browse the repository at this point in the history

Commits on Aug 15, 2020

  1. 3.6.12

    ned-deily committed Aug 15, 2020
    Copy the full SHA
    c0a9afe View commit details
    Browse the repository at this point in the history

Commits on Jul 19, 2020

  1. bpo-39603: Prevent header injection in http methods (GH-18485) (GH-21539

    )
    
    reject control chars in http method in http.client.putrequest to prevent http header injection
    (cherry picked from commit 8ca8a2e)
    
    Co-authored-by: AMIR <31338382+amiremohamadi@users.noreply.github.com>
    miss-islington and amiremohamadi committed Jul 19, 2020
    1
    Copy the full SHA
    f02de96 View commit details
    Browse the repository at this point in the history

Commits on Jul 15, 2020

  1. bpo-39017: Avoid infinite loop in the tarfile module (GH-21454) (#21485)

    Avoid infinite loop when reading specially crafted TAR files using the tarfile module
    (CVE-2019-20907).
    (cherry picked from commit 5a8d121)
    
    Co-authored-by: Rishi <rishi_devan@mail.com>
    miss-islington and rishi93 committed Jul 15, 2020
    Copy the full SHA
    47a2955 View commit details
    Browse the repository at this point in the history

Commits on Jul 13, 2020

  1. bpo-41288: Fix a crash in unpickling invalid NEWOBJ_EX. (GH-21458) (G…

    …H-21462)
    
    Automerge-Triggered-By: @tiran
    (cherry picked from commit 4f309ab)
    
    Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
    miss-islington and serhiy-storchaka committed Jul 13, 2020
    Copy the full SHA
    6463cf0 View commit details
    Browse the repository at this point in the history
Older