Add CVE-2024-6923-follow-up-EOL-email-headers.patch

It is a follow-up to the previous fix of CVE-2024-6923 further encoding
EOL possibly hidden in email headers (bsc#1257181).
This commit is contained in:
2026-01-27 17:58:02 +01:00
parent 8b786ccb53
commit 6230bce579
3 changed files with 117 additions and 0 deletions

View File

@@ -238,6 +238,11 @@ Patch45: gh139257-Support-docutils-0.22.patch
# PATCH-FIX-UPSTREAM pass-test_write_read_limited_history.patch bsc#[0-9]+ mcepl@suse.com
# Fix readline history truncation when length is reduced
Patch48: pass-test_write_read_limited_history.patch
# PATCH-FIX-UPSTREAM CVE-2024-6923-follow-up-EOL-email-headers.patch bsc#1257181 mcepl@suse.com
# Encode newlines in headers when using ByteGenerator
# patch from gh#python/cpython#144125
Patch49: CVE-2024-6923-follow-up-EOL-email-headers.patch
#### END OF PATCHES
BuildRequires: autoconf-archive
BuildRequires: automake
BuildRequires: fdupes