8000 [security][3.3] bpo-30730: Prevent environment variables injection in subprocess on Windows. (GH-2325) by serhiy-storchaka · Pull Request #2363 · python/cpython · GitHub
[go: up one dir, main page]

Skip to content

[security][3.3] bpo-30730: Prevent environment variables injection in subprocess on Windows. (GH-2325) #2363

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 4 commits into from
Jul 19, 2017
Merged
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Merge branch '3.3' into backport-d174d24-3.3
  • Loading branch information
ned-deily authored Jul 19, 2017
commit b1e2f00946795941d13f6d00f0e1d421273131a7
16 changes: 16 additions & 0 deletions Misc/NEWS
Original file line number Diff line number Diff line change
Expand Up @@ -38,6 +38,22 @@ Library
- [Security] bpo-30730: Prevent environment variables injection in subprocess on
Windows. Prevent passing other invalid environment variables and command arguments.

- [Security] bpo-30585: Fix TLS stripping vulnerability in smptlib,
CVE-2016-0772. Reported by Team Oststrom

- [Security] bpo-30694: Upgrade expat copy from 2.2.0 to 2.2.1 to get fixes
of multiple security vulnerabilities including: CVE-2017-9233 (External
entity infinite loop DoS), CVE-2016-9063 (Integer overflow, re-fix),
CVE-2016-0718 (Fix regression bugs from 2.2.0's fix to CVE-2016-0718)
and CVE-2012-0876 (Counter hash flooding with SipHash).
Note: the CVE-2016-5300 (Use os-specific entropy sources like getrandom)
doesn't impact Python, since Python already gets entropy from the OS to set
the expat secret using ``XML_SetHashSalt()``.

- [Security] bpo-29591: Update expat copy from 2.1.0 to 2.2.0 to get fixes
of CVE-2016-0718 and CVE-2016-4472. See
https://sourceforge.net/p/expat/bugs/537/ for more information.

- Issue #28563: Fixed possible DoS and arbitrary code execution when handle
plural form selections in the gettext module. The expression parser now
supports exact syntax supported by GNU gettext.
Expand Down
You are viewing a condensed version of this merge commit. You can view the full changes here.
0