Skip to content

Commit 44a3548

Browse files
committed
Update 3.7.17.7 Version and Release notes
1 parent 9015d8e commit 44a3548

File tree

2 files changed

+26
-1
lines changed

2 files changed

+26
-1
lines changed

Doc/whatsnew/3.7.rst

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2705,3 +2705,28 @@ pyexpat / libexpat
27052705
------------------
27062706

27072707
* Upgrade bundled libexpat to 2.6.4 to fix CVE-2024-50602.
2708+
2709+
Notable changes in 3.7.17.7
2710+
=========================
2711+
2712+
Fixes for these CVEs:
2713+
2714+
CVE-2023-27043
2715+
2716+
A vulnerability in Python's email module (up to version 3.11.3) causes incorrect parsing of email addresses containing special characters. This flaw misidentifies parts of RFC2822 headers, potentially allowing attackers to bypass domain-based email verification mechanisms in applications that restrict access to specific domains.
2717+
NVD
2718+
2719+
CVE-2024-6232
2720+
2721+
The tarfile module in CPython is susceptible to a Regular Expression Denial of Service (ReDoS) vulnerability due to inefficient regular expressions used during header parsing. Specifically crafted tar archives can trigger excessive backtracking, leading to significant CPU resource consumption and potential denial of service.
2722+
NVD+5SUSE+5linux.oracle.com+5
2723+
2724+
CVE-2024-7592
2725+
2726+
A vulnerability in Python's http.cookies module arises when parsing cookie values containing backslashes within quoted strings. The parser employs an algorithm with quadratic complexity, which can be exploited to cause excessive CPU usage, resulting in a denial of service.
2727+
NVD+1Ubuntu+1
2728+
2729+
CVE-2024-9287
2730+
2731+
In CPython's venv module, improper quoting of path names during virtual environment creation allows for command injection into activation scripts (e.g., source venv/bin/activate). This vulnerability enables attackers to execute arbitrary commands when such a virtual environment is activated. Virtual environments not created by an attacker or not activated before use are unaffected.
2732+
starwindsoftware.com+2

Include/patchlevel.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@
2323
#define PY_RELEASE_SERIAL 0
2424

2525
/* Version as a string */
26-
#define PY_VERSION "3.7.17.6"
26+
#define PY_VERSION "3.7.17.7"
2727
/*--end constants--*/
2828

2929
/* Version as a single 4-byte hex number, e.g. 0x010502B2 == 1.5.2b2.

0 commit comments

Comments
 (0)