File _patchinfo of Package patchinfo.33823
<patchinfo incident="33823"> <issue tracker="bnc" id="1220970">GCC 14: python package fails</issue> <issue tracker="bnc" id="1219559">VUL-0: CVE-2023-52425: expat: denial of service (resource consumption) caused by processing large tokens</issue> <issue tracker="bnc" id="1214675">VUL-0: CVE-2022-48560: python3: A use-after-free exists in Python through 3.9 via heappushpop in heapq</issue> <issue tracker="bnc" id="1219306">[TRACKER] Remove python2 from openSUSE:Factory</issue> <issue tracker="bnc" id="1222537">L3-Question: python2: After applying patch SUSE-SLE-SERVER-12-SP5-2024-437 '5.1.3 Bad recipient address syntax'.</issue> <issue tracker="bnc" id="1221854">VUL-0: CVE-2024-0450: python: The zipfile module is vulnerable to "quoted-overlap"</issue> <issue tracker="cve" id="2023-27043"/> <issue tracker="cve" id="2022-48560"/> <issue tracker="cve" id="2023-52425"/> <issue tracker="cve" id="2024-0450"/> <packager>mcepl</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for python</summary> <description>This update for python fixes the following issues: - CVE-2023-52425: Fixed using the system libexpat (bsc#1219559). - CVE-2023-27043: Modifed fix for unicode string handling in email.utils.parseaddr() (bsc#1222537). - CVE-2022-48560: Fixed use-after-free in Python via heappushpop in heapq (bsc#1214675). - CVE-2024-0450: Detect the vulnerability of the "quoted-overlap" zipbomb (bsc#1221854). Bug fixes: - Switch off tests. ONLY FOR FACTORY!!! (bsc#1219306). - Build with -std=gnu89 to build correctly with gcc14 (bsc#1220970). - Switch from %patchN style to the %patch -P N one. </description> </patchinfo>