forked from pool/python315
Remove unnecessary patch and note that the bug has been already fixed.
This commit is contained in:
@@ -3,17 +3,6 @@ Mon Nov 10 10:01:37 UTC 2025 - Andreas Schwab <schwab@suse.de>
|
||||
|
||||
- Update list of skipped tests in qemu linux-user emulation
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Thu Nov 6 23:45:56 UTC 2025 - Matej Cepl <mcepl@cepl.eu>
|
||||
|
||||
- Add CVE-2025-8291-consistency-zip64.patch which checks
|
||||
consistency of the zip64 end of central directory record, and
|
||||
preventing obfuscation of the payload, i.e., you scanning for
|
||||
malicious content in a ZIP file with one ZIP parser (let's say
|
||||
a Rust one) then unpack it in production with another (e.g.,
|
||||
the Python one) and get malicious content that the other parser
|
||||
did not see (CVE-2025-8291, bsc#1251305)
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Fri Oct 24 21:45:47 UTC 2025 - Matej Cepl <mcepl@cepl.eu>
|
||||
|
||||
@@ -89,7 +78,8 @@ Fri Oct 24 21:45:47 UTC 2025 - Matej Cepl <mcepl@cepl.eu>
|
||||
- Security
|
||||
- gh-139700: Check consistency of the zip64 end of central
|
||||
directory record. Support records with “zip64 extensible
|
||||
data” if there are no bytes prepended to the ZIP file.
|
||||
data” if there are no bytes prepended to the ZIP file
|
||||
(bsc#1251305, CVE-2025-8291).
|
||||
- gh-139400: xml.parsers.expat: Make sure that parent
|
||||
Expat parsers are only garbage-collected once they
|
||||
are no longer referenced by subparsers created by
|
||||
|
||||
Reference in New Issue
Block a user