File _patchinfo of Package patchinfo.33823

<patchinfo incident="33823">
  <issue tracker="bnc" id="1220970">GCC 14: python package fails</issue>
  <issue tracker="bnc" id="1219559">VUL-0: CVE-2023-52425: expat: denial of service (resource consumption) caused by processing large tokens</issue>
  <issue tracker="bnc" id="1214675">VUL-0: CVE-2022-48560: python3: A use-after-free exists in Python through 3.9 via heappushpop in heapq</issue>
  <issue tracker="bnc" id="1219306">[TRACKER] Remove python2 from openSUSE:Factory</issue>
  <issue tracker="bnc" id="1222537">L3-Question: python2: After applying patch SUSE-SLE-SERVER-12-SP5-2024-437  '5.1.3 Bad recipient address syntax'.</issue>
  <issue tracker="bnc" id="1221854">VUL-0: CVE-2024-0450: python: The zipfile module is vulnerable to "quoted-overlap"</issue>
  <issue tracker="cve" id="2023-27043"/>
  <issue tracker="cve" id="2022-48560"/>
  <issue tracker="cve" id="2023-52425"/>
  <issue tracker="cve" id="2024-0450"/>
  <packager>mcepl</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for python</summary>
  <description>This update for python fixes the following issues:

- CVE-2023-52425: Fixed using the system libexpat (bsc#1219559).
- CVE-2023-27043: Modifed fix for unicode string handling in email.utils.parseaddr() (bsc#1222537).
- CVE-2022-48560: Fixed use-after-free in Python via heappushpop in heapq (bsc#1214675).
- CVE-2024-0450: Detect the vulnerability of the "quoted-overlap" zipbomb (bsc#1221854).

Bug fixes:

- Switch off tests. ONLY FOR FACTORY!!! (bsc#1219306).
- Build with -std=gnu89 to build correctly with gcc14 (bsc#1220970).
- Switch from %patchN style to the %patch -P N one.
</description>
</patchinfo>
openSUSE Build Service is sponsored by