forked from pool/python311
consistency of the zip64 end of central directory record, and preventing obfuscation of the payload, i.e., you scanning for malicious content in a ZIP file with one ZIP parser (let's say a Rust one) then unpack it in production with another (e.g., the Python one) and get malicious content that the other parser did not see (CVE-2025-8291, bsc#1251305) Readjust patches while synchronizing between openSUSE and SLE trees: - CVE-2023-52425-libexpat-2.6.0-backport.patch - CVE-2023-52425-remove-reparse_deferral-tests.patch - fix_configure_rst.patch - skip_if_buildbot-extend.patch
18 lines
769 B
Diff
18 lines
769 B
Diff
---
|
|
Lib/test/support/__init__.py | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
Index: Python-3.11.14/Lib/test/support/__init__.py
|
|
===================================================================
|
|
--- Python-3.11.14.orig/Lib/test/support/__init__.py 2025-11-11 22:19:19.440964849 +0100
|
|
+++ Python-3.11.14/Lib/test/support/__init__.py 2025-11-11 22:19:39.694606976 +0100
|
|
@@ -394,7 +394,7 @@
|
|
if not reason:
|
|
reason = 'not suitable for buildbots'
|
|
try:
|
|
- isbuildbot = getpass.getuser().lower() == 'buildbot'
|
|
+ isbuildbot = getpass.getuser().lower() in ['buildbot', 'abuild']
|
|
except (KeyError, EnvironmentError) as err:
|
|
warnings.warn(f'getpass.getuser() failed {err}.', RuntimeWarning)
|
|
isbuildbot = False
|