File _patchinfo of Package patchinfo.2695
<patchinfo> <issue id="869222" tracker="bnc">VUL-0: CVE-2013-7338: python: denial of service (endless loop) via corrupted ZIP files</issue> <issue id="856835" tracker="bnc">VUL-1: CVE-2013-1753: python: gzip decompression bomb</issue> <issue id="856836" tracker="bnc">VUL-1: CVE-2013-1752: python: various stdlib read flaws</issue> <issue id="863741" tracker="bnc">VUL-0: CVE-2014-1912: python: buffer overflow in socket.recvfrom_into</issue> <issue id="CVE-2013-7338" tracker="cve" /> <issue id="CVE-2013-1752" tracker="cve" /> <issue id="CVE-2013-1753" tracker="cve" /> <issue id="CVE-2013-4238" tracker="cve" /> <issue id="CVE-2014-1912" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>matejcik</packager> <description> Python was updated to 3.3.5 fixing bugs and security issues: * bugfix-only release, closes several security bugs * CVE-2013-1752 (bnc#856836) - DoS flaws with unbounded reads from network * disable SSLv2 by default * DoS on maliciously crafted zip files (CVE-2013-7338, bnc#869222) * CGIHttpRequestHandler directory traversal * gzip decompression bomb in xmlrpc client (CVE-2013-1753, bnc#856835) xmlrpc_gzip_33.patch * potential buffer overflow in recvfrom_into (CVE-2014-1912, bnc#863741) * hundreds of non-security-related bugfixes </description> <summary>python3: security and bugfix update to 3.3.5</summary> </patchinfo>