Interpreter of the Python programming language
https://git-scm.com/docs/git-apply says: > When running from a subdirectory in a repository, > patched paths outside the directory are ignored. When we run `centpkg prep` in a dist-git repository, patch 351 was silently skipped. When running with --verbose: Skipped patch 'Lib/tarfile.py'. Skipped patch 'Lib/test/recursion.tar'. Skipped patch 'Lib/test/test_tarfile.py'. Skipped patch 'Misc/NEWS.d/next/Library/2020-07-12-22-16-58.bpo-39017.x3Cg-9.rst'. This caused later patches touching the same files (e.g. 437) to not apply cleanly: + echo 'Patch #437 (00437-cve-2024-6232.patch):' Patch #437 (00437-cve-2024-6232.patch): + /usr/bin/patch --no-backup-if-mismatch -f -p1 --fuzz=0 patching file Lib/tarfile.py Hunk #1 succeeded at 860 (offset 14 lines). Hunk #2 FAILED at 1374. Hunk #3 succeeded at 1428 (offset 12 lines). Hunk #4 succeeded at 1452 (offset 12 lines). Hunk #5 succeeded at 1474 (offset 12 lines). 1 out of 5 hunks FAILED -- saving rejects to file Lib/tarfile.py.rej patching file Lib/test/test_tarfile.py Hunk #1 succeeded at 1043 (offset -3 lines). patching file Misc/NEWS.d/next/Security/2024-07-02-13-39-20.gh-issue-121285.hrl-yI.rst In Koji/Brew/mock patch 437 applied cleanly because builddir is not a subdirectory of the cloned dist-git git tree and patch 351 was not skipped. By setting $GIT_DIR we force git to ignore any git work trees in parent directories. We set it to $PWD to make it work properly if we ever make %(auto)setup use git. Thanks to: Florian Weimer, Lumír Balhar. |
||
|---|---|---|
| .gitignore | ||
| 00001-rpath.patch | ||
| 00102-lib64.patch | ||
| 00111-no-static-lib.patch | ||
| 00132-add-rpmbuild-hooks-to-unittest.patch | ||
| 00155-avoid-ctypes-thunks.patch | ||
| 00160-disable-test_fs_holes-in-rpm-build.patch | ||
| 00163-disable-parts-of-test_socket-in-rpm-build.patch | ||
| 00170-gc-assertions.patch | ||
| 00189-use-rpm-wheels.patch | ||
| 00251-change-user-install-location.patch | ||
| 00257-threading-condition-wait.patch | ||
| 00262-pep538_coerce_legacy_c_locale.patch | ||
| 00294-define-TLS-cipher-suite-on-build-time.patch | ||
| 00316-mark-bdist_wininst-unsupported.patch | ||
| 00317-CVE-2019-5010.patch | ||
| 00318-fixes-for-tls-13.patch | ||
| 00319-test_tarfile_ppc64.patch | ||
| 00320-CVE-2019-9636-and-CVE-2019-10160.patch | ||
| 00324-disallow-control-chars-in-http-urls.patch | ||
| 00325-CVE-2019-9948.patch | ||
| 00326-do-not-set-PHA-verify-flag-on-client-side.patch | ||
| 00327-enable-tls-1.3-PHA-in-http.client.patch | ||
| 00329-fips.patch | ||
| 00330-CVE-2018-20852.patch | ||
| 00332-CVE-2019-16056.patch | ||
| 00333-reduce-pgo-tests.patch | ||
| 00338-fix-test_gdb-for-LTO.patch | ||
| 00344-CVE-2019-16935.patch | ||
| 00345-fix-test_site-with-extra-pth-files.patch | ||
| 00346-CVE-2020-8492.patch | ||
| 00351-avoid-infinite-loop-in-the-tarfile-module.patch | ||
| 00352-resolve-hash-collisions-for-ipv4interface-and-ipv6interface.patch | ||
| 00353-architecture-names-upstream-downstream.patch | ||
| 00354-cve-2020-26116-http-request-method-crlf-injection-in-httplib.patch | ||
| 00355-CVE-2020-27619.patch | ||
| 00356-k_and_a_options_for_pathfix.patch | ||
| 00357-CVE-2021-3177.patch | ||
| 00359-CVE-2021-23336.patch | ||
| 00360-CVE-2021-3426.patch | ||
| 00362-threading-enumerate-rlock.patch | ||
| 00364-thread-exit.patch | ||
| 00366-CVE-2021-3733.patch | ||
| 00368-CVE-2021-3737.patch | ||
| 00369-rollover-only-regular-files-in-logging-handlers.patch | ||
| 00370-GIL-monotonic-clock.patch | ||
| 00372-CVE-2021-4189.patch | ||
| 00377-CVE-2022-0391.patch | ||
| 00378-support-expat-2-4-5.patch | ||
| 00382-cve-2015-20107.patch | ||
| 00386-cve-2021-28861.patch | ||
| 00387-cve-2020-10735-prevent-dos-by-very-large-int.patch | ||
| 00394-cve-2022-45061-cpu-denial-of-service-via-inefficient-idna-decoder.patch | ||
| 00397-tarfile-filter.patch | ||
| 00399-cve-2023-24329.patch | ||
| 00404-cve-2023-40217.patch | ||
| 00408-CVE-2022-48560.patch | ||
| 00413-CVE-2022-48564.patch | ||
| 00414-skip_test_zlib_s390x.patch | ||
| 00415-cve-2023-27043-gh-102988-reject-malformed-addresses-in-email-parseaddr-111116.patch | ||
| 00422-gh-115133-fix-tests-for-xmlpullparser-with-expat-2-6-0.patch | ||
| 00426-CVE-2023-6597.patch | ||
| 00427-CVE-2024-0450.patch | ||
| 00431-cve-2024-4032.patch | ||
| 00435-cve-2024-6923.patch | ||
| 00437-cve-2024-6232.patch | ||
| 00443-gh-124651-quote-template-strings-in-venv-activation-scripts.patch | ||
| 00444-security-fix-for-cve-2024-11168.patch | ||
| check-pyc-and-pyo-timestamps.py | ||
| gating.yaml | ||
| get-source.sh | ||
| idle3.appdata.xml | ||
| idle3.desktop | ||
| no-python | ||
| python3.rpmlintrc | ||
| python3.spec | ||
| rpminspect.yaml | ||
| sources | ||
| unversioned-python.1 | ||