diff options
author | Pablo Galindo <pablogsal@gmail.com> | 2025-04-08 15:14:49 +0100 |
---|---|---|
committer | Pablo Galindo <pablogsal@gmail.com> | 2025-04-08 15:15:29 +0100 |
commit | da1f6c61ddfec776a4a2baff75eefad99ee5d84b (patch) | |
tree | 793e143a0cb646c012ec82602cdd9716dab8be60 | |
parent | 553d7069e2a100264ae3492ce81279297ad99cc3 (diff) | |
download | cpython-da1f6c61ddfec776a4a2baff75eefad99ee5d84b.tar.gz cpython-da1f6c61ddfec776a4a2baff75eefad99ee5d84b.zip |
Python 3.11.12v3.11.12
13 files changed, 109 insertions, 36 deletions
diff --git a/Include/patchlevel.h b/Include/patchlevel.h index ffd197f6096..cf8608073a5 100644 --- a/Include/patchlevel.h +++ b/Include/patchlevel.h @@ -18,12 +18,12 @@ /*--start constants--*/ #define PY_MAJOR_VERSION 3 #define PY_MINOR_VERSION 11 -#define PY_MICRO_VERSION 11 +#define PY_MICRO_VERSION 12 #define PY_RELEASE_LEVEL PY_RELEASE_LEVEL_FINAL #define PY_RELEASE_SERIAL 0 /* Version as a string */ -#define PY_VERSION "3.11.11+" +#define PY_VERSION "3.11.12" /*--end constants--*/ /* Version as a single 4-byte hex number, e.g. 0x010502B2 == 1.5.2b2. diff --git a/Lib/pydoc_data/topics.py b/Lib/pydoc_data/topics.py index 5fce45788ce..5923317295a 100644 --- a/Lib/pydoc_data/topics.py +++ b/Lib/pydoc_data/topics.py @@ -1,5 +1,5 @@ # -*- coding: utf-8 -*- -# Autogenerated by Sphinx on Tue Dec 3 12:19:55 2024 +# Autogenerated by Sphinx on Tue Apr 8 15:15:17 2025 # as part of the release process. topics = {'assert': 'The "assert" statement\n' '**********************\n' diff --git a/Misc/NEWS.d/3.11.12.rst b/Misc/NEWS.d/3.11.12.rst new file mode 100644 index 00000000000..62599bcdf86 --- /dev/null +++ b/Misc/NEWS.d/3.11.12.rst @@ -0,0 +1,104 @@ +.. date: 2025-04-07-04-11-08 +.. gh-issue: 131809 +.. nonce: 4MBDuy +.. release date: 2025-04-08 +.. section: Security + +Update bundled libexpat to 2.7.1 + +.. + +.. date: 2025-03-14-23-28-39 +.. gh-issue: 131261 +.. nonce: 0aB6nM +.. section: Security + +Upgrade to libexpat 2.7.0 + +.. + +.. date: 2025-01-28-14-08-03 +.. gh-issue: 105704 +.. nonce: EnhHxu +.. section: Security + +When using :func:`urllib.parse.urlsplit` and :func:`urllib.parse.urlparse` +host parsing would not reject domain names containing square brackets (``[`` +and ``]``). Square brackets are only valid for IPv6 and IPvFuture hosts +according to `RFC 3986 Section 3.2.2 +<https://www.rfc-editor.org/rfc/rfc3986#section-3.2.2>`__. + +.. + +.. date: 2024-08-06-12-27-34 +.. gh-issue: 121284 +.. nonce: 8rwPxe +.. section: Security + +Fix bug in the folding of rfc2047 encoded-words when flattening an email +message using a modern email policy. Previously when an encoded-word was too +long for a line, it would be decoded, split across lines, and re-encoded. +But commas and other special characters in the original text could be left +unencoded and unquoted. This could theoretically be used to spoof header +lines using a carefully constructed encoded-word if the resulting rendered +email was transmitted or re-parsed. + +.. + +.. date: 2024-08-06-11-43-08 +.. gh-issue: 80222 +.. nonce: wfR4BU +.. section: Security + +Fix bug in the folding of quoted strings when flattening an email message +using a modern email policy. Previously when a quoted string was folded so +that it spanned more than one line, the surrounding quotes and internal +escapes would be omitted. This could theoretically be used to spoof header +lines using a carefully constructed quoted string if the resulting rendered +email was transmitted or re-parsed. + +.. + +.. date: 2024-05-24-21-00-52 +.. gh-issue: 119511 +.. nonce: jKrXQ8 +.. section: Security + +Fix a potential denial of service in the :mod:`imaplib` module. When +connecting to a malicious server, it could cause an arbitrary amount of +memory to be allocated. On many systems this is harmless as unused virtual +memory is only a mapping, but if this hit a virtual address size limit it +could lead to a :exc:`MemoryError` or other process crash. On unusual +systems or builds where all allocated memory is touched and backed by actual +ram or storage it could've consumed resources doing so until similarly +crashing. + +.. + +.. date: 2024-11-28-14-14-46 +.. gh-issue: 127257 +.. nonce: n6-jU9 +.. section: Library + +In :mod:`ssl`, system call failures that OpenSSL reports using +``ERR_LIB_SYS`` are now raised as :exc:`OSError`. + +.. + +.. date: 2024-07-19-12-22-48 +.. gh-issue: 121277 +.. nonce: wF_zKd +.. section: Documentation + +Writers of CPython's documentation can now use ``next`` as the version for +the ``versionchanged``, ``versionadded``, ``deprecated`` directives. + +.. + +.. date: 2024-04-05-14-32-21 +.. gh-issue: 106883 +.. nonce: OKmc0Q +.. section: C API + +Disable GC during the _PyThread_CurrentFrames() and +_PyThread_CurrentExceptions() calls to avoid the interpreter to deadlock. diff --git a/Misc/NEWS.d/next/C API/2024-04-05-14-32-21.gh-issue-106883.OKmc0Q.rst b/Misc/NEWS.d/next/C API/2024-04-05-14-32-21.gh-issue-106883.OKmc0Q.rst deleted file mode 100644 index 01c7fb0c790..00000000000 --- a/Misc/NEWS.d/next/C API/2024-04-05-14-32-21.gh-issue-106883.OKmc0Q.rst +++ /dev/null @@ -1 +0,0 @@ -Disable GC during the _PyThread_CurrentFrames() and _PyThread_CurrentExceptions() calls to avoid the interpreter to deadlock. diff --git a/Misc/NEWS.d/next/Documentation/2024-07-19-12-22-48.gh-issue-121277.wF_zKd.rst b/Misc/NEWS.d/next/Documentation/2024-07-19-12-22-48.gh-issue-121277.wF_zKd.rst deleted file mode 100644 index 60f75ae0c21..00000000000 --- a/Misc/NEWS.d/next/Documentation/2024-07-19-12-22-48.gh-issue-121277.wF_zKd.rst +++ /dev/null @@ -1,2 +0,0 @@ -Writers of CPython's documentation can now use ``next`` as the version for -the ``versionchanged``, ``versionadded``, ``deprecated`` directives. diff --git a/Misc/NEWS.d/next/Library/2024-11-28-14-14-46.gh-issue-127257.n6-jU9.rst b/Misc/NEWS.d/next/Library/2024-11-28-14-14-46.gh-issue-127257.n6-jU9.rst deleted file mode 100644 index fb0380cba0b..00000000000 --- a/Misc/NEWS.d/next/Library/2024-11-28-14-14-46.gh-issue-127257.n6-jU9.rst +++ /dev/null @@ -1,2 +0,0 @@ -In :mod:`ssl`, system call failures that OpenSSL reports using -``ERR_LIB_SYS`` are now raised as :exc:`OSError`. diff --git a/Misc/NEWS.d/next/Security/2024-05-24-21-00-52.gh-issue-119511.jKrXQ8.rst b/Misc/NEWS.d/next/Security/2024-05-24-21-00-52.gh-issue-119511.jKrXQ8.rst deleted file mode 100644 index f7b4031120e..00000000000 --- a/Misc/NEWS.d/next/Security/2024-05-24-21-00-52.gh-issue-119511.jKrXQ8.rst +++ /dev/null @@ -1,7 +0,0 @@ -Fix a potential denial of service in the :mod:`imaplib` module. When connecting -to a malicious server, it could cause an arbitrary amount of memory to be -allocated. On many systems this is harmless as unused virtual memory is only a -mapping, but if this hit a virtual address size limit it could lead to a -:exc:`MemoryError` or other process crash. On unusual systems or builds where -all allocated memory is touched and backed by actual ram or storage it could've -consumed resources doing so until similarly crashing. diff --git a/Misc/NEWS.d/next/Security/2024-08-06-11-43-08.gh-issue-80222.wfR4BU.rst b/Misc/NEWS.d/next/Security/2024-08-06-11-43-08.gh-issue-80222.wfR4BU.rst deleted file mode 100644 index 0f0661d0b1c..00000000000 --- a/Misc/NEWS.d/next/Security/2024-08-06-11-43-08.gh-issue-80222.wfR4BU.rst +++ /dev/null @@ -1,6 +0,0 @@ -Fix bug in the folding of quoted strings when flattening an email message using -a modern email policy. Previously when a quoted string was folded so that -it spanned more than one line, the surrounding quotes and internal escapes -would be omitted. This could theoretically be used to spoof header lines -using a carefully constructed quoted string if the resulting rendered email -was transmitted or re-parsed. diff --git a/Misc/NEWS.d/next/Security/2024-08-06-12-27-34.gh-issue-121284.8rwPxe.rst b/Misc/NEWS.d/next/Security/2024-08-06-12-27-34.gh-issue-121284.8rwPxe.rst deleted file mode 100644 index 923e91170d3..00000000000 --- a/Misc/NEWS.d/next/Security/2024-08-06-12-27-34.gh-issue-121284.8rwPxe.rst +++ /dev/null @@ -1,7 +0,0 @@ -Fix bug in the folding of rfc2047 encoded-words when flattening an email message -using a modern email policy. Previously when an encoded-word was too long -for a line, it would be decoded, split across lines, and re-encoded. But commas -and other special characters in the original text could be left unencoded and -unquoted. This could theoretically be used to spoof header lines using -a carefully constructed encoded-word if the resulting rendered email was -transmitted or re-parsed. diff --git a/Misc/NEWS.d/next/Security/2025-01-28-14-08-03.gh-issue-105704.EnhHxu.rst b/Misc/NEWS.d/next/Security/2025-01-28-14-08-03.gh-issue-105704.EnhHxu.rst deleted file mode 100644 index bff1bc6b0d6..00000000000 --- a/Misc/NEWS.d/next/Security/2025-01-28-14-08-03.gh-issue-105704.EnhHxu.rst +++ /dev/null @@ -1,4 +0,0 @@ -When using :func:`urllib.parse.urlsplit` and :func:`urllib.parse.urlparse` host -parsing would not reject domain names containing square brackets (``[`` and -``]``). Square brackets are only valid for IPv6 and IPvFuture hosts according to -`RFC 3986 Section 3.2.2 <https://www.rfc-editor.org/rfc/rfc3986#section-3.2.2>`__. diff --git a/Misc/NEWS.d/next/Security/2025-03-14-23-28-39.gh-issue-131261.0aB6nM.rst b/Misc/NEWS.d/next/Security/2025-03-14-23-28-39.gh-issue-131261.0aB6nM.rst deleted file mode 100644 index fa56e7a452b..00000000000 --- a/Misc/NEWS.d/next/Security/2025-03-14-23-28-39.gh-issue-131261.0aB6nM.rst +++ /dev/null @@ -1 +0,0 @@ -Upgrade to libexpat 2.7.0 diff --git a/Misc/NEWS.d/next/Security/2025-04-07-04-11-08.gh-issue-131809.4MBDuy.rst b/Misc/NEWS.d/next/Security/2025-04-07-04-11-08.gh-issue-131809.4MBDuy.rst deleted file mode 100644 index 1421b4d851d..00000000000 --- a/Misc/NEWS.d/next/Security/2025-04-07-04-11-08.gh-issue-131809.4MBDuy.rst +++ /dev/null @@ -1 +0,0 @@ -Update bundled libexpat to 2.7.1 diff --git a/README.rst b/README.rst index 72fcdeb28da..208af9002ce 100644 --- a/README.rst +++ b/README.rst @@ -1,4 +1,4 @@ -This is Python version 3.11.11 +This is Python version 3.11.12 ============================== .. image:: https://github.com/python/cpython/workflows/Tests/badge.svg @@ -229,4 +229,4 @@ This Python distribution contains *no* GNU General Public License (GPL) code, so it may be used in proprietary projects. There are interfaces to some GNU code but these are entirely optional. -All trademarks referenced herein are property of their respective holders. +All trademarks referenced herein are property of their respective holders.
\ No newline at end of file |