Skip to content

Commit 595f9cc

Browse files
committed
Python 3.9.16
1 parent 3b81c13 commit 595f9cc

10 files changed

+93
-38
lines changed

Include/patchlevel.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@
1818
/*--start constants--*/
1919
#define PY_MAJOR_VERSION 3
2020
#define PY_MINOR_VERSION 9
21-
#define PY_MICRO_VERSION 15
21+
#define PY_MICRO_VERSION 16
2222
#define PY_RELEASE_LEVEL PY_RELEASE_LEVEL_FINAL
2323
#define PY_RELEASE_SERIAL 0
2424

2525
/* Version as a string */
26-
#define PY_VERSION "3.9.15+"
26+
#define PY_VERSION "3.9.16"
2727
/*--end constants--*/
2828

2929
/* Version as a single 4-byte hex number, e.g. 0x010502B2 == 1.5.2b2.

Misc/NEWS.d/3.9.16.rst

Lines changed: 90 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,90 @@
1+
.. date: 2022-12-05-01-39-10
2+
.. gh-issue: 100001
3+
.. nonce: uD05Fc
4+
.. release date: 2022-12-06
5+
.. section: Security
6+
7+
``python -m http.server`` no longer allows terminal control characters sent
8+
within a garbage request to be printed to the stderr server log.
9+
10+
This is done by changing the :mod:`http.server`
11+
:class:`BaseHTTPRequestHandler` ``.log_message`` method to replace control
12+
characters with a ``\xHH`` hex escape before printing.
13+
14+
..
15+
16+
.. date: 2022-11-11-12-50-28
17+
.. gh-issue: 87604
18+
.. nonce: OtwH5L
19+
.. section: Security
20+
21+
Avoid publishing list of active per-interpreter audit hooks via the
22+
:mod:`gc` module
23+
24+
..
25+
26+
.. date: 2022-11-04-09-29-36
27+
.. gh-issue: 98433
28+
.. nonce: l76c5G
29+
.. section: Security
30+
31+
The IDNA codec decoder used on DNS hostnames by :mod:`socket` or
32+
:mod:`asyncio` related name resolution functions no longer involves a
33+
quadratic algorithm. This prevents a potential CPU denial of service if an
34+
out-of-spec excessive length hostname involving bidirectional characters
35+
were decoded. Some protocols such as :mod:`urllib` http ``3xx`` redirects
36+
potentially allow for an attacker to supply such a name.
37+
38+
..
39+
40+
.. date: 2022-10-26-21-04-23
41+
.. gh-issue: 98739
42+
.. nonce: keBWcY
43+
.. section: Security
44+
45+
Update bundled libexpat to 2.5.0
46+
47+
..
48+
49+
.. date: 2022-10-21-13-31-47
50+
.. gh-issue: 98517
51+
.. nonce: SXXGfV
52+
.. section: Security
53+
54+
Port XKCP's fix for the buffer overflows in SHA-3 (CVE-2022-37454).
55+
56+
..
57+
58+
.. date: 2022-09-07-10-42-00
59+
.. gh-issue: 97514
60+
.. nonce: Yggdsl
61+
.. section: Security
62+
63+
On Linux the :mod:`multiprocessing` module returns to using filesystem
64+
backed unix domain sockets for communication with the *forkserver* process
65+
instead of the Linux abstract socket namespace. Only code that chooses to
66+
use the :ref:`"forkserver" start method <multiprocessing-start-methods>` is
67+
affected.
68+
69+
Abstract sockets have no permissions and could allow any user on the system
70+
in the same `network namespace
71+
<https://man7.org/linux/man-pages/man7/network_namespaces.7.html>`_ (often
72+
the whole system) to inject code into the multiprocessing *forkserver*
73+
process. This was a potential privilege escalation. Filesystem based socket
74+
permissions restrict this to the *forkserver* process user as was the
75+
default in Python 3.8 and earlier.
76+
77+
This prevents Linux `CVE-2022-42919
78+
<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42919>`_.
79+
80+
..
81+
82+
.. date: 2022-04-27-18-25-30
83+
.. gh-issue: 68966
84+
.. nonce: gjS8zs
85+
.. section: Security
86+
87+
The deprecated mailcap module now refuses to inject unsafe text (filenames,
88+
MIME types, parameters) into shell commands. Instead of using such text, it
89+
will warn and act as if a match was not found (or for test commands, as if
90+
the test failed).

Misc/NEWS.d/next/Security/2022-04-27-18-25-30.gh-issue-68966.gjS8zs.rst

Lines changed: 0 additions & 4 deletions
This file was deleted.

Misc/NEWS.d/next/Security/2022-09-07-10-42-00.gh-issue-97514.Yggdsl.rst

Lines changed: 0 additions & 15 deletions
This file was deleted.

Misc/NEWS.d/next/Security/2022-10-21-13-31-47.gh-issue-98517.SXXGfV.rst

Lines changed: 0 additions & 1 deletion
This file was deleted.

Misc/NEWS.d/next/Security/2022-10-26-21-04-23.gh-issue-98739.keBWcY.rst

Lines changed: 0 additions & 1 deletion
This file was deleted.

Misc/NEWS.d/next/Security/2022-11-04-09-29-36.gh-issue-98433.l76c5G.rst

Lines changed: 0 additions & 6 deletions
This file was deleted.

Misc/NEWS.d/next/Security/2022-11-11-12-50-28.gh-issue-87604.OtwH5L.rst

Lines changed: 0 additions & 2 deletions
This file was deleted.

Misc/NEWS.d/next/Security/2022-12-05-01-39-10.gh-issue-100001.uD05Fc.rst

Lines changed: 0 additions & 6 deletions
This file was deleted.

README.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
This is Python version 3.9.15
1+
This is Python version 3.9.16
22
=============================
33

44
.. image:: https://travis-ci.org/python/cpython.svg?branch=3.9

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy