summaryrefslogtreecommitdiff
path: root/lang/py37-html-docs
diff options
context:
space:
mode:
authoradam <adam@pkgsrc.org>2021-06-29 12:39:10 +0000
committeradam <adam@pkgsrc.org>2021-06-29 12:39:10 +0000
commita2ccabffd0844327236d63c17b75cf6ed535e5e6 (patch)
tree950e53a958cdf215112f17d135c9d8f7edd66b2b /lang/py37-html-docs
parent1d22a1b8ca1be65a5af38845fcc4f69ee0cfd87e (diff)
downloadpkgsrc-a2ccabffd0844327236d63c17b75cf6ed535e5e6.tar.gz
python37: updated to 3.7.11
Python 3.7.11 final Security bpo-44022: mod:http.client now avoids infinitely reading potential HTTP headers after a 100 Continue status response from the server. bpo-43882: The presence of newline or tab characters in parts of a URL could allow some forms of attacks. Following the controlling specification for URLs defined by WHATWG urllib.parse() now removes ASCII newlines and tabs from URLs, preventing such attacks. bpo-42988: CVE-2021-3426: Remove the getfile feature of the pydoc module which could be abused to read arbitrary files on the disk (directory traversal vulnerability). Moreover, even source code of Python modules can contain sensitive data like passwords. Vulnerability reported by David Schwörer. bpo-43285: ftplib no longer trusts the IP address value returned from the server in response to the PASV command by default. This prevents a malicious FTP server from using the response to probe IPv4 address and port combinations on the client network. Code that requires the former vulnerable behavior may set a trust_server_pasv_ipv4_address attribute on their ftplib.FTP instances to True to re-enable it. bpo-43075: Fix Regular Expression Denial of Service (ReDoS) vulnerability in urllib.request.AbstractBasicAuthHandler. The ReDoS-vulnerable regex has quadratic worst-case complexity and it allows cause a denial of service when identifying crafted invalid RFCs. This ReDoS issue is on the client side and needs remote attackers to control the HTTP server. Core and Builtins bpo-43660: Fix crash that happens when replacing sys.stderr with a callable that can remove the object while an exception is being printed. Patch by Pablo Galindo. Tests bpo-41561: Add workaround for Ubuntu’s custom OpenSSL security level policy.
Diffstat (limited to 'lang/py37-html-docs')
-rw-r--r--lang/py37-html-docs/Makefile4
-rw-r--r--lang/py37-html-docs/distinfo10
2 files changed, 7 insertions, 7 deletions
diff --git a/lang/py37-html-docs/Makefile b/lang/py37-html-docs/Makefile
index 6514df73c60..ef46c5101aa 100644
--- a/lang/py37-html-docs/Makefile
+++ b/lang/py37-html-docs/Makefile
@@ -1,6 +1,6 @@
-# $NetBSD: Makefile,v 1.11 2021/02/16 19:40:34 adam Exp $
+# $NetBSD: Makefile,v 1.12 2021/06/29 12:39:10 adam Exp $
-VERS= 3.7.10
+VERS= 3.7.11
DISTNAME= python-${VERS}-docs-html
PKGNAME= py37-html-docs-${VERS}
CATEGORIES= lang python
diff --git a/lang/py37-html-docs/distinfo b/lang/py37-html-docs/distinfo
index 545ba6e98a8..b1c82446f61 100644
--- a/lang/py37-html-docs/distinfo
+++ b/lang/py37-html-docs/distinfo
@@ -1,6 +1,6 @@
-$NetBSD: distinfo,v 1.11 2021/02/16 19:40:34 adam Exp $
+$NetBSD: distinfo,v 1.12 2021/06/29 12:39:10 adam Exp $
-SHA1 (python-3.7.10-docs-html.tar.bz2) = f0fd74f55801dd8518ba61937eba795b9f54f17c
-RMD160 (python-3.7.10-docs-html.tar.bz2) = a68f6dcff3e9752fae41cfd32780574bf9e1e7aa
-SHA512 (python-3.7.10-docs-html.tar.bz2) = c303561ce3b758df1ee017ab8dad862adad116eedf1f2d0ed1180529e0af06526c9293810fe086f8223ec97b2c935cb08ca7e74bc20b9be93dc4e97909f5f561
-Size (python-3.7.10-docs-html.tar.bz2) = 6289108 bytes
+SHA1 (python-3.7.11-docs-html.tar.bz2) = 3d5898ea5d603ac4e689ddffe35820286e14e75f
+RMD160 (python-3.7.11-docs-html.tar.bz2) = c49b3b4f9e76c6f5b2a5a95638ec470bc06f2c1f
+SHA512 (python-3.7.11-docs-html.tar.bz2) = c2e354df460b20cbcf49cde56a93070033dc8364f6678bcab62ffd66dbe9803447d5169c033486331351c2cc1dc7140879297e0ad1ce35c6788c94ad3555b283
+Size (python-3.7.11-docs-html.tar.bz2) = 6294193 bytes