https://github.com/python/cpython/commit/da1f6c61ddfec776a4a2baff75eefad99ee5d84b
commit: da1f6c61ddfec776a4a2baff75eefad99ee5d84b
branch: 3.11
author: Pablo Galindo <pablog...@gmail.com>
committer: pablogsal <pablog...@gmail.com>
date: 2025-04-08T15:15:29+01:00
summary:

Python 3.11.12

files:
A Misc/NEWS.d/3.11.12.rst
D Misc/NEWS.d/next/C API/2024-04-05-14-32-21.gh-issue-106883.OKmc0Q.rst
D Misc/NEWS.d/next/Documentation/2024-07-19-12-22-48.gh-issue-121277.wF_zKd.rst
D Misc/NEWS.d/next/Library/2024-11-28-14-14-46.gh-issue-127257.n6-jU9.rst
D Misc/NEWS.d/next/Security/2024-05-24-21-00-52.gh-issue-119511.jKrXQ8.rst
D Misc/NEWS.d/next/Security/2024-08-06-11-43-08.gh-issue-80222.wfR4BU.rst
D Misc/NEWS.d/next/Security/2024-08-06-12-27-34.gh-issue-121284.8rwPxe.rst
D Misc/NEWS.d/next/Security/2025-01-28-14-08-03.gh-issue-105704.EnhHxu.rst
D Misc/NEWS.d/next/Security/2025-03-14-23-28-39.gh-issue-131261.0aB6nM.rst
D Misc/NEWS.d/next/Security/2025-04-07-04-11-08.gh-issue-131809.4MBDuy.rst
M Include/patchlevel.h
M Lib/pydoc_data/topics.py
M README.rst

diff --git a/Include/patchlevel.h b/Include/patchlevel.h
index ffd197f6096f07..cf8608073a53b6 100644
--- a/Include/patchlevel.h
+++ b/Include/patchlevel.h
@@ -18,12 +18,12 @@
 /*--start constants--*/
 #define PY_MAJOR_VERSION        3
 #define PY_MINOR_VERSION        11
-#define PY_MICRO_VERSION        11
+#define PY_MICRO_VERSION        12
 #define PY_RELEASE_LEVEL        PY_RELEASE_LEVEL_FINAL
 #define PY_RELEASE_SERIAL       0
 
 /* Version as a string */
-#define PY_VERSION              "3.11.11+"
+#define PY_VERSION              "3.11.12"
 /*--end constants--*/
 
 /* Version as a single 4-byte hex number, e.g. 0x010502B2 == 1.5.2b2.
diff --git a/Lib/pydoc_data/topics.py b/Lib/pydoc_data/topics.py
index 5fce45788ceaea..5923317295ada7 100644
--- a/Lib/pydoc_data/topics.py
+++ b/Lib/pydoc_data/topics.py
@@ -1,5 +1,5 @@
 # -*- coding: utf-8 -*-
-# Autogenerated by Sphinx on Tue Dec  3 12:19:55 2024
+# Autogenerated by Sphinx on Tue Apr  8 15:15:17 2025
 # as part of the release process.
 topics = {'assert': 'The "assert" statement\n'
            '**********************\n'
diff --git a/Misc/NEWS.d/3.11.12.rst b/Misc/NEWS.d/3.11.12.rst
new file mode 100644
index 00000000000000..62599bcdf862c9
--- /dev/null
+++ b/Misc/NEWS.d/3.11.12.rst
@@ -0,0 +1,104 @@
+.. date: 2025-04-07-04-11-08
+.. gh-issue: 131809
+.. nonce: 4MBDuy
+.. release date: 2025-04-08
+.. section: Security
+
+Update bundled libexpat to 2.7.1
+
+..
+
+.. date: 2025-03-14-23-28-39
+.. gh-issue: 131261
+.. nonce: 0aB6nM
+.. section: Security
+
+Upgrade to libexpat 2.7.0
+
+..
+
+.. date: 2025-01-28-14-08-03
+.. gh-issue: 105704
+.. nonce: EnhHxu
+.. section: Security
+
+When using :func:`urllib.parse.urlsplit` and :func:`urllib.parse.urlparse`
+host parsing would not reject domain names containing square brackets (``[``
+and ``]``). Square brackets are only valid for IPv6 and IPvFuture hosts
+according to `RFC 3986 Section 3.2.2
+<https://www.rfc-editor.org/rfc/rfc3986#section-3.2.2>`__.
+
+..
+
+.. date: 2024-08-06-12-27-34
+.. gh-issue: 121284
+.. nonce: 8rwPxe
+.. section: Security
+
+Fix bug in the folding of rfc2047 encoded-words when flattening an email
+message using a modern email policy. Previously when an encoded-word was too
+long for a line, it would be decoded, split across lines, and re-encoded.
+But commas and other special characters in the original text could be left
+unencoded and unquoted. This could theoretically be used to spoof header
+lines using a carefully constructed encoded-word if the resulting rendered
+email was transmitted or re-parsed.
+
+..
+
+.. date: 2024-08-06-11-43-08
+.. gh-issue: 80222
+.. nonce: wfR4BU
+.. section: Security
+
+Fix bug in the folding of quoted strings when flattening an email message
+using a modern email policy. Previously when a quoted string was folded so
+that it spanned more than one line, the surrounding quotes and internal
+escapes would be omitted. This could theoretically be used to spoof header
+lines using a carefully constructed quoted string if the resulting rendered
+email was transmitted or re-parsed.
+
+..
+
+.. date: 2024-05-24-21-00-52
+.. gh-issue: 119511
+.. nonce: jKrXQ8
+.. section: Security
+
+Fix a potential denial of service in the :mod:`imaplib` module. When
+connecting to a malicious server, it could cause an arbitrary amount of
+memory to be allocated. On many systems this is harmless as unused virtual
+memory is only a mapping, but if this hit a virtual address size limit it
+could lead to a :exc:`MemoryError` or other process crash. On unusual
+systems or builds where all allocated memory is touched and backed by actual
+ram or storage it could've consumed resources doing so until similarly
+crashing.
+
+..
+
+.. date: 2024-11-28-14-14-46
+.. gh-issue: 127257
+.. nonce: n6-jU9
+.. section: Library
+
+In :mod:`ssl`, system call failures that OpenSSL reports using
+``ERR_LIB_SYS`` are now raised as :exc:`OSError`.
+
+..
+
+.. date: 2024-07-19-12-22-48
+.. gh-issue: 121277
+.. nonce: wF_zKd
+.. section: Documentation
+
+Writers of CPython's documentation can now use ``next`` as the version for
+the ``versionchanged``, ``versionadded``, ``deprecated`` directives.
+
+..
+
+.. date: 2024-04-05-14-32-21
+.. gh-issue: 106883
+.. nonce: OKmc0Q
+.. section: C API
+
+Disable GC during the _PyThread_CurrentFrames() and
+_PyThread_CurrentExceptions() calls to avoid the interpreter to deadlock.
diff --git a/Misc/NEWS.d/next/C 
API/2024-04-05-14-32-21.gh-issue-106883.OKmc0Q.rst b/Misc/NEWS.d/next/C 
API/2024-04-05-14-32-21.gh-issue-106883.OKmc0Q.rst
deleted file mode 100644
index 01c7fb0c790708..00000000000000
--- a/Misc/NEWS.d/next/C API/2024-04-05-14-32-21.gh-issue-106883.OKmc0Q.rst     
+++ /dev/null
@@ -1 +0,0 @@
-Disable GC during the _PyThread_CurrentFrames() and 
_PyThread_CurrentExceptions() calls to avoid the interpreter to deadlock.
diff --git 
a/Misc/NEWS.d/next/Documentation/2024-07-19-12-22-48.gh-issue-121277.wF_zKd.rst 
b/Misc/NEWS.d/next/Documentation/2024-07-19-12-22-48.gh-issue-121277.wF_zKd.rst
deleted file mode 100644
index 60f75ae0c21326..00000000000000
--- 
a/Misc/NEWS.d/next/Documentation/2024-07-19-12-22-48.gh-issue-121277.wF_zKd.rst
+++ /dev/null
@@ -1,2 +0,0 @@
-Writers of CPython's documentation can now use ``next`` as the version for
-the ``versionchanged``, ``versionadded``, ``deprecated`` directives.
diff --git 
a/Misc/NEWS.d/next/Library/2024-11-28-14-14-46.gh-issue-127257.n6-jU9.rst 
b/Misc/NEWS.d/next/Library/2024-11-28-14-14-46.gh-issue-127257.n6-jU9.rst
deleted file mode 100644
index fb0380cba0b607..00000000000000
--- a/Misc/NEWS.d/next/Library/2024-11-28-14-14-46.gh-issue-127257.n6-jU9.rst
+++ /dev/null
@@ -1,2 +0,0 @@
-In :mod:`ssl`, system call failures that OpenSSL reports using
-``ERR_LIB_SYS`` are now raised as :exc:`OSError`.
diff --git 
a/Misc/NEWS.d/next/Security/2024-05-24-21-00-52.gh-issue-119511.jKrXQ8.rst 
b/Misc/NEWS.d/next/Security/2024-05-24-21-00-52.gh-issue-119511.jKrXQ8.rst
deleted file mode 100644
index f7b4031120e643..00000000000000
--- a/Misc/NEWS.d/next/Security/2024-05-24-21-00-52.gh-issue-119511.jKrXQ8.rst
+++ /dev/null
@@ -1,7 +0,0 @@
-Fix a potential denial of service in the :mod:`imaplib` module. When connecting
-to a malicious server, it could cause an arbitrary amount of memory to be
-allocated. On many systems this is harmless as unused virtual memory is only a
-mapping, but if this hit a virtual address size limit it could lead to a
-:exc:`MemoryError` or other process crash. On unusual systems or builds where
-all allocated memory is touched and backed by actual ram or storage it could've
-consumed resources doing so until similarly crashing.
diff --git 
a/Misc/NEWS.d/next/Security/2024-08-06-11-43-08.gh-issue-80222.wfR4BU.rst 
b/Misc/NEWS.d/next/Security/2024-08-06-11-43-08.gh-issue-80222.wfR4BU.rst
deleted file mode 100644
index 0f0661d0b1cf4a..00000000000000
--- a/Misc/NEWS.d/next/Security/2024-08-06-11-43-08.gh-issue-80222.wfR4BU.rst
+++ /dev/null
@@ -1,6 +0,0 @@
-Fix bug in the folding of quoted strings when flattening an email message using
-a modern email policy. Previously when a quoted string was folded so that
-it spanned more than one line, the surrounding quotes and internal escapes
-would be omitted. This could theoretically be used to spoof header lines
-using a carefully constructed quoted string if the resulting rendered email
-was transmitted or re-parsed.
diff --git 
a/Misc/NEWS.d/next/Security/2024-08-06-12-27-34.gh-issue-121284.8rwPxe.rst 
b/Misc/NEWS.d/next/Security/2024-08-06-12-27-34.gh-issue-121284.8rwPxe.rst
deleted file mode 100644
index 923e91170d355f..00000000000000
--- a/Misc/NEWS.d/next/Security/2024-08-06-12-27-34.gh-issue-121284.8rwPxe.rst
+++ /dev/null
@@ -1,7 +0,0 @@
-Fix bug in the folding of rfc2047 encoded-words when flattening an email 
message
-using a modern email policy. Previously when an encoded-word was too long
-for a line, it would be decoded, split across lines, and re-encoded. But commas
-and other special characters in the original text could be left unencoded and
-unquoted. This could theoretically be used to spoof header lines using
-a carefully constructed encoded-word if the resulting rendered email was
-transmitted or re-parsed.
diff --git 
a/Misc/NEWS.d/next/Security/2025-01-28-14-08-03.gh-issue-105704.EnhHxu.rst 
b/Misc/NEWS.d/next/Security/2025-01-28-14-08-03.gh-issue-105704.EnhHxu.rst
deleted file mode 100644
index bff1bc6b0d609c..00000000000000
--- a/Misc/NEWS.d/next/Security/2025-01-28-14-08-03.gh-issue-105704.EnhHxu.rst
+++ /dev/null
@@ -1,4 +0,0 @@
-When using :func:`urllib.parse.urlsplit` and :func:`urllib.parse.urlparse` host
-parsing would not reject domain names containing square brackets (``[`` and
-``]``). Square brackets are only valid for IPv6 and IPvFuture hosts according 
to
-`RFC 3986 Section 3.2.2 
<https://www.rfc-editor.org/rfc/rfc3986#section-3.2.2>`__.
diff --git 
a/Misc/NEWS.d/next/Security/2025-03-14-23-28-39.gh-issue-131261.0aB6nM.rst 
b/Misc/NEWS.d/next/Security/2025-03-14-23-28-39.gh-issue-131261.0aB6nM.rst
deleted file mode 100644
index fa56e7a452bc2a..00000000000000
--- a/Misc/NEWS.d/next/Security/2025-03-14-23-28-39.gh-issue-131261.0aB6nM.rst
+++ /dev/null
@@ -1 +0,0 @@
-Upgrade to libexpat 2.7.0
diff --git 
a/Misc/NEWS.d/next/Security/2025-04-07-04-11-08.gh-issue-131809.4MBDuy.rst 
b/Misc/NEWS.d/next/Security/2025-04-07-04-11-08.gh-issue-131809.4MBDuy.rst
deleted file mode 100644
index 1421b4d851dd50..00000000000000
--- a/Misc/NEWS.d/next/Security/2025-04-07-04-11-08.gh-issue-131809.4MBDuy.rst
+++ /dev/null
@@ -1 +0,0 @@
-Update bundled libexpat to 2.7.1
diff --git a/README.rst b/README.rst
index 72fcdeb28da07a..208af9002cec01 100644
--- a/README.rst
+++ b/README.rst
@@ -1,4 +1,4 @@
-This is Python version 3.11.11
+This is Python version 3.11.12
 ==============================
 
 .. image:: https://github.com/python/cpython/workflows/Tests/badge.svg
@@ -229,4 +229,4 @@ This Python distribution contains *no* GNU General Public 
License (GPL) code,
 so it may be used in proprietary projects.  There are interfaces to some GNU
 code but these are entirely optional.
 
-All trademarks referenced herein are property of their respective holders.
+All trademarks referenced herein are property of their respective holders.
\ No newline at end of file

_______________________________________________
Python-checkins mailing list -- python-checkins@python.org
To unsubscribe send an email to python-checkins-le...@python.org
https://mail.python.org/mailman3/lists/python-checkins.python.org/
Member address: arch...@mail-archive.com

Reply via email to