Skip to content

Tags: fedora-python/cpython

Tags

fedora-3.6.15-47

Toggle fedora-3.6.15-47's commit message
00465: tarfile cves

Security fixes for CVE-2025-4517, CVE-2025-4330, CVE-2025-4138, CVE-2024-12718, CVE-2025-4435 on tarfile

The backported fixes do not contain changes for ntpath.py and related tests,
because the support for symlinks and junctions were added later in Python 3.9,
and it does not make sense to backport them to 3.6 here.

The patch is contains the following changes:
- python@42deeab
  fixes symlink handling for tarfile.data_filter
- python@9d2c2a8
  fixes handling of existing files/symlinks in tarfile
- python@00af979
  adds a new "strict" argument to realpath()
- python@dd8f187
  fixes mulriple CVE fixes in the tarfile module
- downstream only fixes that makes the changes work and compatible with Python 3.6

fedora-3.11.13-1

Toggle fedora-3.11.13-1's commit message
00462: Fix PySSL_SetError handling SSL_ERROR_SYSCALL

Python 3.10 changed from using SSL_write() and SSL_read() to SSL_write_ex() and
SSL_read_ex(), but did not update handling of the return value.

Change error handling so that the return value is not examined.
OSError (not EOF) is now returned when retval is 0.

This resolves the issue of failing tests when a system is
stressed on OpenSSL 3.5.

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
Co-authored-by: Petr Viktorin <encukou@gmail.com>

fedora-3.10.18-1

Toggle fedora-3.10.18-1's commit message
00462: Fix PySSL_SetError handling SSL_ERROR_SYSCALL

Python 3.10 changed from using SSL_write() and SSL_read() to SSL_write_ex() and
SSL_read_ex(), but did not update handling of the return value.

Change error handling so that the return value is not examined.
OSError (not EOF) is now returned when retval is 0.

This resolves the issue of failing tests when a system is
stressed on OpenSSL 3.5.

Co-authored-by: Serhiy Storchaka <storchaka@gmail.com>
Co-authored-by: Petr Viktorin <encukou@gmail.com>

fedora-3.9.23-1

Toggle fedora-3.9.23-1's commit message
00452: Properly apply exported CFLAGS for dtrace/systemtap builds

When using --with-dtrace the resulting object file could be missing
specific CFLAGS exported by the build system due to the systemtap
script using specific defaults.

Exporting the CC and CFLAGS variables before the dtrace invocation
allows us to properly apply CFLAGS exported by the build system
even when cross-compiling.

Co-authored-by: stratakis <cstratak@redhat.com>

fedora-3.14.0b4-1

Toggle fedora-3.14.0b4-1's commit message
00466: Downstream only: Skip tests not working with older expat version

We want to run these tests in Fedora and EPEL 10, but not in EPEL 9,
which has too old version of expat. We set the upper bound version
in the conditionalized skip to a release available in CentOS Stream 10,
which is tested as working.

fedora-3.13.5-2

Toggle fedora-3.13.5-2's commit message
00466: Downstream only: Skip tests not working with older expat version

We want to run these tests in Fedora and EPEL 10, but not in EPEL 9,
which has too old version of expat. We set the upper bound version
in the conditionalized skip to a release available in CentOS Stream 10,
which is tested as working.

fedora-3.14.0b3-2

Toggle fedora-3.14.0b3-2's commit message
00464: Enable PAC and BTI protections for aarch64

Apply protection against ROP/JOP attacks for aarch64 on asm_trampoline.S

The BTI flag must be applied in the assembler sources for this class
of attacks to be mitigated on newer aarch64 processors.

Upstream PR: https://github.com/python/cpython/pull/130864/files

The upstream patch is incomplete but only for the case where
frame pointers are not used on 3.13+.

Since on Fedora we always compile with frame pointers the BTI/PAC
hardware protections can be enabled without losing Perf unwinding.

fedora-3.14.0b3-1

Toggle fedora-3.14.0b3-1's commit message
00461: Downstream only: Install wheel in test venvs when setuptools < 71

This can be removed when Fedora 41 goes EOL (or updates setuptools).

fedora-3.13.5-1

Toggle fedora-3.13.5-1's commit message
00464: Enable PAC and BTI protections for aarch64

Apply protection against ROP/JOP attacks for aarch64 on asm_trampoline.S

The BTI flag must be applied in the assembler sources for this class
of attacks to be mitigated on newer aarch64 processors.

Upstream PR: https://github.com/python/cpython/pull/130864/files

The upstream patch is incomplete but only for the case where
frame pointers are not used on 3.13+.

Since on Fedora we always compile with frame pointers the BTI/PAC
hardware protections can be enabled without losing Perf unwinding.

fedora-3.12.11-2

Toggle fedora-3.12.11-2's commit message
00464: Enable PAC and BTI protections for aarch64

Apply protection against ROP/JOP attacks for aarch64 on asm_trampoline.S

The BTI flag must be applied in the assembler sources for this class
of attacks to be mitigated on newer aarch64 processors.

Upstream PR: https://github.com/python/cpython/pull/130864/files

The upstream patch is incomplete but only for the case where
frame pointers are not used on 3.13+.

Since on Fedora we always compile with frame pointers the BTI/PAC
hardware protections can be enabled without losing Perf unwinding.
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy