Add CVE-2024-6923-follow-up-EOL-email-headers.patch

It is a follow-up to the previous fix of CVE-2024-6923 further encoding
EOL possibly hidden in email headers (bsc#1257181).
This commit is contained in:
2026-01-27 17:58:02 +01:00
parent 97fc2dfa82
commit 4c387b3dba
3 changed files with 121 additions and 0 deletions

View File

@@ -228,6 +228,10 @@ Patch42: gh139257-Support-docutils-0.22.patch
# PATCH-FIX-UPSTREAM longer-time-test_thread_time.patch gh#python/cpython!143558 mcepl@suse.com
# tolerate 100 ms instead of 20 ms to support slow CIs.
Patch43: longer-time-test_thread_time.patch
# PATCH-FIX-UPSTREAM CVE-2024-6923-follow-up-EOL-email-headers.patch bsc#1257181 mcepl@suse.com
# Encode newlines in headers when using ByteGenerator
# patch from gh#python/cpython#144125
Patch44: CVE-2024-6923-follow-up-EOL-email-headers.patch
#### Python 3.15 DEVELOPMENT PATCHES
BuildRequires: autoconf-archive
BuildRequires: automake