summaryrefslogtreecommitdiffstats
path: root/Misc/NEWS.d/next/Security
diff options
context:
space:
mode:
authorThomas Wouters <thomas@python.org>2022-11-14 11:12:42 (GMT)
committerThomas Wouters <thomas@python.org>2022-11-14 11:18:11 (GMT)
commit3b9d793efcfd2c00c14ffbeab1a3389bf3b095ff (patch)
treee087ca2d68d9625d036606f2acb7a3f2d19b0d92 /Misc/NEWS.d/next/Security
parentdb115682bd639a2642c617f0b7d5b30cd7d7f472 (diff)
downloadcpython-3b9d793efcfd2c00c14ffbeab1a3389bf3b095ff.zip
cpython-3b9d793efcfd2c00c14ffbeab1a3389bf3b095ff.tar.gz
cpython-3b9d793efcfd2c00c14ffbeab1a3389bf3b095ff.tar.bz2
Python 3.12.0a2v3.12.0a2
Diffstat (limited to 'Misc/NEWS.d/next/Security')
-rw-r--r--Misc/NEWS.d/next/Security/2022-10-26-21-04-23.gh-issue-98739.keBWcY.rst1
-rw-r--r--Misc/NEWS.d/next/Security/2022-11-04-09-29-36.gh-issue-98433.l76c5G.rst14
2 files changed, 0 insertions, 15 deletions
diff --git a/Misc/NEWS.d/next/Security/2022-10-26-21-04-23.gh-issue-98739.keBWcY.rst b/Misc/NEWS.d/next/Security/2022-10-26-21-04-23.gh-issue-98739.keBWcY.rst
deleted file mode 100644
index b63a54b..0000000
--- a/Misc/NEWS.d/next/Security/2022-10-26-21-04-23.gh-issue-98739.keBWcY.rst
+++ /dev/null
@@ -1 +0,0 @@
-Update bundled libexpat to 2.5.0
diff --git a/Misc/NEWS.d/next/Security/2022-11-04-09-29-36.gh-issue-98433.l76c5G.rst b/Misc/NEWS.d/next/Security/2022-11-04-09-29-36.gh-issue-98433.l76c5G.rst
deleted file mode 100644
index 0d649dc..0000000
--- a/Misc/NEWS.d/next/Security/2022-11-04-09-29-36.gh-issue-98433.l76c5G.rst
+++ /dev/null
@@ -1,14 +0,0 @@
-The IDNA codec decoder used on DNS hostnames by :mod:`socket` or :mod:`asyncio`
-related name resolution functions no longer involves a quadratic algorithm.
-This prevents a potential CPU denial of service if an out-of-spec excessive
-length hostname involving bidirectional characters were decoded. Some protocols
-such as :mod:`urllib` http ``3xx`` redirects potentially allow for an attacker
-to supply such a name.
-
-Individual labels within an IDNA encoded DNS name will now raise an error early
-during IDNA decoding if they are longer than 1024 unicode characters given that
-each decoded DNS label must be 63 or fewer characters and the entire decoded
-DNS name is limited to 255. Only an application presenting a hostname or label
-consisting primarily of :rfc:`3454` section 3.1 "Nothing" characters to be
-removed would run into of this new limit. See also :rfc:`5894` section 6 and
-:rfc:`3491`.