python-xml-2.7.18-150000.77.1<>,gҝp9|zjqhy##D9AJzog~΃*qgΆv8hBMs~Z]5o(/NV ~CZ㗆Ԓ6/i N\n Q:d!~r7.p\47KM).T:%0AzFMY/Â#]`fl6#0VgZq'$<*̊[ځ̖TvO{dH,uH\Ld||b)>44hUHd;Gj =\>A`?Pd   7 'D\blHH H H H H H<HH 4HT   (8u9u:&uBFGHHHIHX@YPZ[\H]H^db4cd[e`fcleuxHvwHxHyHz LCpython-xml2.7.18150000.77.1A Python XML InterfaceThe expat module is a Python interface to the expat XML parser. Since Python2.x, it is part of the core Python distribution.gҝibs-power9-22 SUSE Linux Enterprise 15SUSE LLC Python-2.0https://www.suse.com/Development/Libraries/Pythonhttps://www.python.org/linuxppc64leh66ffOO 8 8~n  f E.3301;;%|D>::r"=;E;E6a22-$991XKKA큤A큤A큤A큤A큤gҝzgҝwgw@gҝrgҝrgҝwgw@gҝrgҝrgw@gҝrgҝrgw@gҝrgҝrgw@gҝrgҝvgw@gҝrgҝvgw@gҝrgҝvgw@gҝrgҝrgw@gҝrgҝvgҝwgw@gҝrgҝrgw@gҝrgҝrgw@gҝrgҝvgw@gҝrgҝrgw@gҝrgҝrgҝwgw@gҝrgҝrgw@gҝrgҝrgҝwgw@gҝrgҝrgw@gҝrgҝrgw@gҝrgҝrgw@gҝrgҝrgw@gҝrgҝrgw@gҝrgҝ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-base-2.7.18-150000.77.1.src.rpmpython-xmlpython-xml(ppc-64)python2-xmlpyxml@@@@@@     libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libexpat.so.1()(64bit)libpthread.so.0()(64bit)libpython2.7.so.1.0()(64bit)python(abi)python-baserpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PartialHardlinkSets)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)2.72.7.18-150000.77.13.0.4-14.6.0-14.0.4-14.0-15.2-14.14.1gw@g@g@g4f@fH@f?]fh@e,e @eedeeeRd˖dD@dq@du@dtdm@dxdc>@cӼc0c|ck@c pcbbb@b@b@ba@a@a(@aim@aI@a'@a#aj@a`t`8`_T^J^@^@^>^>^;^8 @^.^g@^ @]f@]@]]]d@]d@]@]z@]V]y@]9]1]\t@\\7\7\\J@\J@\C@\2[[#@[6@[@[ @[Za@Z@ZxG@ZtRZp^@Z, gh#python/cpython#103848#issuecomment-2708135083).- Modify CVE-2025-0938-sq-brackets-domain-names.patch: we don't use bracketed_host variable any more (correction of the fix for bsc#1236705, discovered during analysis for bsc#1223694).- Add CVE-2025-0938-sq-brackets-domain-names.patch which disallows square brackets ([ and ]) in domain names for parsed URLs (bsc#1236705, CVE-2025-0938, gh#python/cpython#105704)- Add CVE-2024-11168-validation-IPv6-addrs.patch fixing bsc#1233307 (CVE-2024-11168, gh#python/cpython#103848): Improper validation of IPv6 and IPvFuture addresses. - Add ipaddress module from https://github.com/phihag/ipaddress - Remove -IVendor/ from python-config boo#1231795- Stop using %%defattr, it seems to be breaking proper executable attributes on /usr/bin/ scripts (bsc#1227378).- bsc#1221854 (CVE-2024-0450) Add CVE-2024-0450-zipfile-avoid-quoted-overlap-zipbomb.patch detecting the vulnerability of the "quoted-overlap" zipbomb (from gh#python/cpython!110016).- Switch to using the system libexpat (bsc#1219559, CVE-2023-52425) - Make sure to remove all embedded versions of other packages (including expat). - Add CVE-2023-52425-libexpat-2.6.0-remove-failing-tests.patch removing failing test fixing bpo#3151, which we just not support. - Remove patches over those embedded packages (cffi): - python-2.7-libffi-aarch64.patch - sparc_longdouble.patch- Modify CVE-2023-27043-email-parsing-errors.patch to fix the unicode string handling in email.utils.parseaddr() (bsc#1222537). - Revert CVE-2022-48560-after-free-heappushpop.patch, the fix was unneeded.- Switch off tests. ONLY FOR FACTORY!!! (bsc#1219306)- Build with -std=gnu89 to build correctly with gcc14, bsc#1220970- Add CVE-2023-27043-email-parsing-errors.patch to gh#python/cpython!111116, fixing bsc#1210638 (CVE-2023-27043).- Add CVE-2022-48560-after-free-heappushpop.patch fixing use-after-free in Python via heappushpop in heapq (bsc#1214675, CVE-2022-48560). - switch from %patchN style to the %patch -P N one.- (bsc#1214691, CVE-2022-48566) Add CVE-2022-48566-compare_digest-more-constant.patch to make compare_digest more constant-time. - Allow nis.so for SLE-12.- (bsc#1214685, CVE-2022-48565) Add CVE-2022-48565-plistlib-XML-vulns.patch (from gh#python/cpython#86217) reject XML entity declarations in plist files. - Remove BOTH CVE-2023-27043-email-parsing-errors.patch and Revert-gh105127-left-tests.patch (as per discussion on bsc#1210638).- Add CVE-2023-40217-avoid-ssl-pre-close.patch fixing gh#python/cpython#108310, backport from upstream patch gh#python/cpython#108315 (bsc#1214692, CVE-2023-40217)- IT MEANS THAT bsc#1210638 STILL HAS NOT BEEN FIXED! - Add Revert-gh105127-left-tests.patch (gh#python/cpython!106941) partially reverting CVE-2023-27043-email-parsing-errors.patch, because of the regression in gh#python/cpython#106669.- (bsc#1210638, CVE-2023-27043) Add CVE-2023-27043-email-parsing-errors.patch, which detects email address parsing errors and returns empty tuple to indicate the parsing error (old API).- Fix the application of the python-2.7.17-switch-off-failing-SSL-tests.patch.- python-2.7.5-multilib.patch: Update for riscv64 - Don't fail if _ctypes or dl extension was not built- The condition around libnsl-devel BuildRequires is NOT switching off NIS support on SLE < 15, support for NIS used to be in the glibc itself. Partial revert of sr#1061583.- Add PygmentsBridge-trime_doctest_flags.patch to allow build of the documentation even with the current Sphinx. (SUSE-ONLY PATCH, DO NOT SEND UPSTREAM!)- Enable --with-system-ffi for non-standard architectures.- SLE-12 builds nis.so as well.- Add CVE-2023-24329-blank-URL-bypass.patch (CVE-2023-24329, bsc#1208471) blocklists bypass via the urllib.parse component when supplying a URL that starts with blank characters- Disable NIS for new products, it's deprecated and gets removed- Add skip_unverified_test.patch because apparently switching off SSL verification doesn't work on older SLE.- Restore python-2.7.9-sles-disable-verification-by-default.patch for SLE-12.- Add CVE-2022-45061-DoS-by-IDNA-decode.patch to avoid CVE-2022-45061 (bsc#1205244) allowing DoS by IDNA decoding extremely long domain names.- Add bpo34990-2038-problem-compileall.patch making compileall.py compliant with year 2038 (bsc#1202666, gh#python/cpython#79171), backport of fix to Python 2.7.- Add patch CVE-2021-28861-double-slash-path.patch: * BaseHTTPServer: Fix an open redirection vulnerability in the HTTP server when an URI path starts with //. (bsc#1202624, CVE-2021-28861)- Add CVE-2015-20107-mailcap-unsafe-filenames.patch to avoid CVE-2015-20107 (bsc#1198511, gh#python/cpython#68966), the command injection in the mailcap module.- Filter out executable-stack error that is triggered for i586 target.- Update bundled pip wheel to the latest SLE version patched against bsc#1186819 (CVE-2021-3572). - Recover again proper value of %python2_package_prefix (bsc#1175619).- BuildRequire rpm-build-python: The provider to inject python(abi) has been moved there. rpm-build pulls rpm-build-python automatically in when building anything against python3-base, but this implies that the initial build of python3-base does not trigger the automatic installation.- Older SLE versions should use old OpenSSL.- Add CVE-2022-0391-urllib_parse-newline-parsing.patch (bsc#1195396, CVE-2022-0391, bpo#43882) sanitizing URLs containing ASCII newline and tabs in urlparse.- Add CVE-2021-4189-ftplib-trust-PASV-resp.patch (bsc#1194146, bpo#43285, CVE-2021-4189, gh#python/cpython#24838) make ftplib not trust the PASV response.- build against openssl 1.1.x (incompatible with openssl 3.0x) for now.- on sle12, python2 modules will still be called python-xxxx until EOL, for newer SLE versions they will be python2-xxxx- BuildRequire rpm-build-python: The provider to inject python(abi) has been moved there. rpm-build pulls rpm-build-python automatically in when building anything against python3-base, but this implies that the initial build of python3-base does not trigger the automatic installation.- Add CVE-2019-20907_tarfile-inf-loop.patch fixing bsc#1174091 (CVE-2019-20907, bpo#39017) avoiding possible infinite loop in specifically crafted tarball. Add recursion.tar as a testing tarball for the patch. - Provide the newest setuptools wheel (bsc#1176262, CVE-2019-20916) in their correct form (bsc#1180686). - Add CVE-2020-26116-httplib-header-injection.patch fixing bsc#1177211 (CVE-2020-26116, bpo#39603) no longer allowing special characters in the method parameter of HTTPConnection.putrequest in httplib, stopping injection of headers. Such characters now raise ValueError.- Renamed patch for assigned CVE: * bpo44022-fix-http-client-infinite-line-reading-after-a-HTTP-100-Continue.patch -> CVE-2021-3737-fix-HTTP-client-infinite-line-reading-after-a-HTTP-100-Continue.patch (boo#1189241, CVE-2021-3737)- Renamed patch for assigned CVE: * bpo43075-fix-ReDoS-in-request.patch -> CVE-2021-3733-fix-ReDoS-in-request.patch (boo#1189287, CVE-2021-3733) - Fix python-doc build (bpo#35293): * sphinx-update-removed-function.patch - Update documentation formatting for Sphinx 3.0 (bpo#40204).- Add bpo43075-fix-ReDoS-in-request.patch which fixes ReDoS in request (bpo#43075, boo#1189287). - Add missing security announcement to bpo44022-fix-http-client-infinite-line-reading-after-a-HTTP-100-Continue.patch.- Add bpo44022-fix-http-client-infinite-line-reading-after-a-HTTP-100-Continue.patch which fixes http client infinite line reading (DoS) after a http 100 (bpo#44022, boo#1189241).- Modify Lib/ensurepip/__init__.py to contain the same version numbers as are in reality the ones in the bundled wheels (bsc#1187668).- Add CVE-2021-23336-only-amp-as-query-sep.patch which forbids use of semicolon as a query string separator (bpo#42967, bsc#1182379, CVE-2021-23336).- Add CVE-2021-3177-buf_ovrfl_PyCArg_repr.patch fixing bsc#1181126 (CVE-2021-3177) buffer overflow in PyCArg_repr in _ctypes/callproc.c, which may lead to remote code execution.- (bsc#1180125) We really don't Require python-rpm-macros package. Unnecessary dependency.- Add patch configure_PYTHON_FOR_REGEN.patch which makes configure.ac to consider the correct version of PYTHON_FO_REGEN (bsc#1078326).- Use python3-Sphinx on anything more recent than SLE-15 (inclusive).- Update to 2.7.18, final release of Python 2. Ever.: - Newline characters have been escaped when performing uu encoding to prevent them from overflowing into to content section of the encoded file. This prevents malicious or accidental modification of data during the decoding process. - Fixes a ReDoS vulnerability in `http.cookiejar`. Patch by Ben Caller. - Fixed line numbers and column offsets for AST nodes for calls without arguments in decorators. - bsc#1155094 (CVE-2019-18348) Disallow control characters in hostnames in http.client. Such potentially malicious header injection URLs now cause a InvalidURL to be raised. - Fix urllib.urlretrieve failing on subsequent ftp transfers from the same host. - Fix problems identified by GCC's -Wstringop-truncation warning. - AddRefActCtx() was needlessly being checked for failure in PC/dl_nt.c. - Prevent failure of test_relative_path in test_py_compile on macOS Catalina. - Fixed possible leak in `PyArg_Parse` and similar functions for format units "es#" and "et#" when the macro `PY_SSIZE_T_CLEAN` is not defined. - Remove upstreamed patches: - CVE-2019-18348-CRLF_injection_via_host_part.patch - python-2.7.14-CVE-2017-1000158.patch - CVE-2018-14647_XML_SetHashSalt-in_elementtree.patch - CVE-2018-1061-DOS-via-regexp-difflib.patch - CVE-2019-10160-netloc-port-regression.patch - CVE-2019-16056-email-parse-addr.patch- Add CVE-2019-9674-zip-bomb.patch to improve documentation warning about dangers of zip-bombs and other security problems with zipfile library. (bsc#1162825 CVE-2019-9674)- Change to Requires: libpython%{so_version} == %{version}-%{release} to python-base to keep both packages always synchronized (add %{so_version}) (bsc#1162224).- Add CVE-2020-8492-urllib-ReDoS.patch fixing the security bug "Python urrlib allowed an HTTP server to conduct Regular Expression Denial of Service (ReDoS)" (bsc#1162367)- Provide python-testsuite from devel subkg to ease py2->py3 dependencies- Add python-2.7.17-switch-off-failing-SSL-tests.patch to switch off tests coliding with the combination of modern Python and ancient OpenSSL on SLE-12.- libnsl is required only on more recent SLEs and openSUSE, older glibc supported NIS on its own.- Add provides in gdbm subpackage to provide dbm symbols. This allows us to use %%{python_module dbm} as a dependency and have it properly resolved for both python2 and python3- Drop appstream-glib BuildRequires and no longer call appstream-util validate-relax: eliminate a build cycle between as-glib and python. The only thing would would gain by calling as-uril is catching if upstream breaks the appdata.xml file in a future release. Considering py2 is dying, chances for a new release, let alone one breaking the xml file, are slim.- Unify packages among openSUSE:Factory and SLE versions. (bsc#1159035) ; add missing records to this changelog. - Add idle.desktop and idle.appdata.xml to provide IDLE in menus (bsc#1153830)- Add python2_split_startup Provide to make it possible to conflict older packages by shared-python-startup.- Move /etc/pythonstart script to shared-python-startup package.- Add bpo-36576-skip_tests_for_OpenSSL-111.patch (originally from bpo#36576) skipping tests failing with OpenSSL 1.1.1. Fixes bsc#1149792- Add adapted-from-F00251-change-user-install-location.patch fixing pip/distutils to install into /usr/local.- Update to 2.7.17: - a bug fix release in the Python 2.7.x series. It is expected to be the penultimate release for Python 2.7. - Removed patches included upstream: - CVE-2018-20852-cookie-domain-check.patch - CVE-2019-16935-xmlrpc-doc-server_title.patch - CVE-2019-9636-netloc-no-decompose-characters.patch - CVE-2019-9947-no-ctrl-char-http.patch - CVE-2019-9948-avoid_local-file.patch - python-2.7.14-CVE-2018-1000030-1.patch - python-2.7.14-CVE-2018-1000030-2.patch - Renamed remove-static-libpython.diff and python-bsddb6.diff to remove-static-libpython.patch and python-bsddb6.patch to unify filenames.- Add CVE-2019-16935-xmlrpc-doc-server_title.patch fixing bsc#1153238 (aka CVE-2019-16935) fixing a reflected XSS in python/Lib/DocXMLRPCServer.py- Add bpo36302-sort-module-sources.patch (boo#1041090)- Add CVE-2019-16056-email-parse-addr.patch fixing the email module wrongly parses email addresses [bsc#1149955, CVE-2019-16056]- boo#1141853 (CVE-2018-20852) add CVE-2018-20852-cookie-domain-check.patch fixing http.cookiejar.DefaultPolicy.domain_return_ok which did not correctly validate the domain: it could be tricked into sending cookies to the wrong server.- Skip test_urllib2_localnet that randomly fails in OBS- bsc#1138459: add CVE-2019-10160-netloc-port-regression.patch which fixes regression introduced by the previous patch. (CVE-2019-10160) Upstream gh#python/cpython#13812- Set _lto_cflags to nil as it will prevent to propage LTO for Python modules that are built in a separate package.- bsc#1130840 (CVE-2019-9947): add CVE-2019-9947-no-ctrl-char-http.patch Address the issue by disallowing URL paths with embedded whitespace or control characters through into the underlying http client request. Such potentially malicious header injection URLs now cause a ValueError to be raised.- bsc#1130847 (CVE-2019-9948) add CVE-2019-9948-avoid_local-file.patch removing unnecessary (and potentially harmful) URL scheme local-file://.- bsc#1129346: add CVE-2019-9636-netloc-no-decompose-characters.patch Characters in the netloc attribute that decompose under NFKC normalization (as used by the IDNA encoding) into any of ``/``, ``?``, ``#``, ``@``, or ``:`` will raise a ValueError. If the URL is decomposed before parsing, or is not a Unicode string, no error will be raised (CVE-2019-9636). Upstream commits e37ef41 and 507bd8c.- (bsc#1111793) Update to 2.7.16: * bugfix-only release: complete list of changes on https://github.com/python/cpython/blob/2.7/Misc/NEWS.d/2.7.16rc1.rst * Removed openssl-111.patch and CVE-2018-1000802-shutil_use_subprocess_no_spawn.patch which are fully included in the tarball. * Updated patches to apply cleanly: CVE-2019-5010-null-defer-x509-cert-DOS.patch bpo36160-init-sysconfig_vars.patch do-not-use-non-ascii-in-test_ssl.patch openssl-111-middlebox-compat.patch openssl-111-ssl_options.patch python-2.5.1-sqlite.patch python-2.6-gettext-plurals.patch python-2.7-dirs.patch python-2.7.2-fix_date_time_compiler.patch python-2.7.4-canonicalize2.patch python-2.7.5-multilib.patch python-2.7.9-ssl_ca_path.patch python-bsddb6.diff remove-static-libpython.patch * Update python-2.7.5-multilib.patch to pass with new platlib regime.- bsc#1109847 (CVE-2018-14647): add CVE-2018-14647_XML_SetHashSalt-in_elementtree.patch fixing bpo-34623.- bsc#1073748: add bpo-29347-dereferencing-undefined-pointers.patch PyWeakref_NewProxy@Objects/weakrefobject.c creates new isntance of PyWeakReference struct and does not intialize wr_prev and wr_next of new isntance. These pointers can have garbage and point to random memory locations. Python should not crash while destroying the isntance created in the same interpreter function. As per my understanding, both wr_prev and wr_next of PyWeakReference instance should be initialized to NULL to avoid segfault.- bsc#1122191: add CVE-2019-5010-null-defer-x509-cert-DOS.patch fixing bpo-35746 (CVE-2019-5010). An exploitable denial-of-service vulnerability exists in the X509 certificate parser of Python.org Python 2.7.11 / 3.7.2. A specially crafted X509 certificate can cause a NULL pointer dereference, resulting in a denial of service. An attacker can initiate or accept TLS connections using crafted certificates to trigger this vulnerability.- Use upstream-recommended %{_rpmconfigdir}/macros.d directory for the rpm macros.- Add patch openssl-111.patch to work with openssl-1.1.1 (bsc#1113755)- Apply "CVE-2018-1000802-shutil_use_subprocess_no_spawn.patch" which converts shutil._call_external_zip to use subprocess rather than distutils.spawn. [bsc#1109663, CVE-2018-1000802]- Apply "CVE-2018-1061-DOS-via-regexp-difflib.patch" to prevent low-grade poplib REDOS (CVE-2018-1060) and to prevent difflib REDOS (CVE-2018-1061). Prior to this patch mail server's timestamp was susceptible to catastrophic backtracking on long evil response from the server. Also, it was susceptible to catastrophic backtracking, which was a potential DOS vector. [bsc#1088004 and bsc#1088009, CVE-2018-1061 and CVE-2018-1060]- Apply "CVE-2017-18207.patch" to add a check to Lib/wave.py that verifies that at least one channel is provided. Prior to this check, attackers could cause a denial of service (divide-by-zero error and application crash) via a crafted wav format audio file. [bsc#1083507, CVE-2017-18207]- Apply "python-sorted_tar.patch" (bsc#1086001, boo#1081750) sort tarfile output directory listing- update to 2.7.15 * dozens of bugfixes, see NEWS for details - removed obsolete patches: * python-ncurses-6.0-accessors.patch * python-fix-shebang.patch * gcc8-miscompilation-fix.patch - add patch from upstream: * do-not-use-non-ascii-in-test_ssl.patch- Add gcc8-miscompilation-fix.patch (boo#1084650).- Apply "python-2.7.14-CVE-2017-1000158.patch" to prevent integer overflows in PyString_DecodeEscape that could have resulted in heap-based buffer overflow attacks and possible arbitrary code execution. [bsc#1068664, CVE-2017-1000158]- exclude test_socket & test_subprocess for PowerPC boo#1078485 (same ref as previous change)- Add python-skip_random_failing_tests.patch bypass boo#1078485 and exclude many tests for PowerPC- Add patch python-fix-shebang.patch to fix bsc#1078326- exclude test_regrtest for s390, where it does not segfault as it should (fixes bsc#1073269) - fix segfault while creating weakref - bsc#1073748, bpo#29347 (this is actually fixed by the 2.7.14 update; mentioning this for purposes of bugfix tracking)- update to 2.7.14 * dozens of bugfixes, see NEWS for details * fixed possible integer overflow in PyString_DecodeEscape (CVE-2017-1000158, bsc#1068664) * fixed segfaults with dict mutated during search * fixed possible free-after-use problems with buffer objects with custom indexing * fixed urllib.splithost to correctly parse fragments (bpo-30500) - drop upstreamed python-2.7.13-overflow_check.patch - drop unneeded python-2.7.12-makeopcode.patch - drop upstreamed 0001-2.7-bpo-30714-ALPN-changes-for-OpenSSL-1.1.0f-3094.patch - Apply "python-2.7.14-CVE-2018-1000030-1.patch" and "python-2.7.14-CVE-2018-1000030-2.patch" to remedy a bug that would crash the Python interpreter when multiple threads used the same I/O stream concurrently. This issue is not classified as a security vulnerability due to the fact that an attacker must be able to run code, however in some situations -- such as function as a service -- this vulnerability can potentially be used by an attacker to violate a trust boundary. [bsc#1079300, CVE-2018-1000030]- Call python2 instead of python in macros- Fix test broken with OpenSSL 1.1 (bsc#1042670) * add 0001-2.7-bpo-30714-ALPN-changes-for-OpenSSL-1.1.0f-3094.patch- drop SUSE_ASNEEDED=0 as it is not needed anymore- Add libnsl-devel build requires for glibc obsoleting libnsl- obsolete/provide python-argparse and provide python2-argparse, because the argparse module is available from python 2.7 up- SLE package update (bsc#1027282) - refresh python-2.7.5-multilib.patch - dropped upstreamed patches: python-fix-short-dh.patch python-2.7.7-mhlib-linkcount.patch python-2.7-urllib2-localnet-ssl.patch CVE-2016-0772-smtplib-starttls.patch CVE-2016-5699-http-header-injection.patch CVE-2016-5636-zipimporter-overflow.patch python-2.7-httpoxy.patch - Add python-ncurses-6.0-accessors.patch: Fix build with NCurses 6.0 and OPAQUE_WINDOW set to 1. (dimstar@opensuse.org)- Add reproducible.patch to allow reproducible builds of various python packages like python-amqp Upstream: https://github.com/python/cpython/pull/296- update to 2.7.13 * dozens of bugfixes, see NEWS for details * updated cipher lists for openssl wrapper, support openssl >= 1.1.0 * properly fix HTTPoxy (CVE-2016-1000110) * profile-opt build now applies PGO to modules as well - update python-2.7.10-overflow_check.patch with python-2.7.13-overflow_check.patch, incorporating upstream changes (bnc#964182) - add "-fwrapv" to optflags explicitly because upstream code still relies on it in many places- provide python2-* symbols, for support of new packages built as python2-foo - rename macros.python to macros.python2 accordingly - require python-rpm-macros package, drop macro definitions from macros.python2- initial packaging of `python27` side-by-side variant (fate#321075, bsc#997436) - renamed `python` to `python27` in package names and requires - removed Provides and Obsoletes clauses - dropped SLE12-only patch python-2.7.9-sles-disable-verification-by-default.patch, companion sle_tls_checks_policy.py file and the python-strict-tls-checks subpackage - dropped profile files - removed /usr/bin/python and /usr/bin/python2, along with other unversioned aliases - rewrote macros file to enable stand-alone packages depending on py2.7 - re-included downloaded version of HTML documentation- update to 2.7.12 * dozens of bugfixes, see NEWS for details * fixes multiple security issues: CVE-2016-0772 TLS stripping attack on smtplib (bsc#984751) CVE-2016-5636 zipimporter heap overflow (bsc#985177) CVE-2016-5699 httplib header injection (bsc#985348) (this one is actually fixed since 2.7.10) - removed upstreamed python-2.7.7-mhlib-linkcount.patch - refreshed multilib patch - python-2.7.12-makeopcode.patch - run newly-built python interpreter to make opcodes, in order not to require pre-built python - update LD_LIBRARY_PATH to use $PWD instead of "." because the test process escapes to its own directory - modify shebang-fixing scriptlet to ignore makeopcodetargets.py- CVE-2016-0772-smtplib-starttls.patch: smtplib vulnerability opens startTLS stripping attack (CVE-2016-0772, bsc#984751) - CVE-2016-5636-zipimporter-overflow.patch: heap overflow when importing malformed zip files (CVE-2016-5636, bsc#985177) - CVE-2016-5699-http-header-injection.patch: incorrect validation of HTTP headers allow header injection (CVE-2016-5699, bsc#985348) - python-2.7-httpoxy.patch: HTTPoxy vulnerability in urllib, fixed by disregarding HTTP_PROXY when REQUEST_METHOD is also set (CVE-2016-1000110, bsc#989523)- Add python-2.7.10-overflow_check.patch to fix broken overflow checks. [bnc#964182]- copy strict-tls-checks subpackage from SLE to retain future compatibility (not built in openSUSE) - do this properly to fix bnc#945401 - update SLE check to exclude Leap which also has version 1315, just to be sure- Add python-ncurses-6.0-accessors.patch: Fix build with NCurses 6.0 and OPAQUE_WINDOW set to 1.- add missing ssl.pyc and ssl.pyo to package - implement python-strict-tls-checks subpackage * when present, Python will perform TLS certificate checking by default. it is possible to remove the package to turn off the checks for compatibility with legacy scripts. * as discussed in fate#318300 * this is not built for openSUSE, but retained here in case we want to build the package for a SLE system- python-fix-short-dh.patch: Bump DH parameters to 2048 bit to fix logjam security issue. bsc#935856- add __python2 compatibility macro (used by Fedora) (fate#318838)- update to 2.7.10 - removed obsolete python-2.7-urllib2-localnet-ssl.patch- Reenable test_posix on aarch64- python-2.7.4-aarch64.patch: Remove obsolete patch - python-2.7-libffi-aarch64.patch: Fix argument passing in libffi for aarch64- update to 2.7.9 * contains full backport of ssl module from Python 3.4 (PEP466) * HTTPS certificate validation enabled by default (PEP476) * SSLv3 disabled by default (bnc#901715) * backported ensurepip module (PEP477) * fixes several missing CVEs from last release: CVE-2013-1752, CVE-2013-1753 * dozens of minor bugfixes - dropped upstreamed patches: python-2.7.6-poplib.patch, smtplib_maxline-2.7.patch, xmlrpc_gzip_27.patch - dropped patch python-2.7.3-ssl_ca_path.patch because we don't need it with ssl module from Python 3 - libffi was upgraded upstream, seems to contain our changes, so dropping libffi-ppc64le.diff as well - python-2.7-urllib2-localnet-ssl.patch - properly remove unconditional "import ssl" from test_urllib2_localnet that caused it to fail without ssl- skip test_thread in qemu_linux_user modepyxmlibs-power9-22 1741856189  !!#$$&'()**,--/0113446788:;;=>>@AACDDFGG2.7.18-150000.77.12.7.18-150000.77.12.7.180.8.50.8.5pyexpat.soxml__init__.py__init__.pyc__init__.pyodomNodeFilter.pyNodeFilter.pycNodeFilter.pyo__init__.py__init__.pyc__init__.pyodomreg.pydomreg.pycdomreg.pyoexpatbuilder.pyexpatbuilder.pycexpatbuilder.pyominicompat.pyminicompat.pycminicompat.pyominidom.pyminidom.pycminidom.pyopulldom.pypulldom.pycpulldom.pyoxmlbuilder.pyxmlbuilder.pycxmlbuilder.pyoetreeElementInclude.pyElementInclude.pycElementInclude.pyoElementPath.pyElementPath.pycElementPath.pyoElementTree.pyElementTree.pycElementTree.pyo__init__.py__init__.pyc__init__.pyocElementTree.pycElementTree.pyccElementTree.pyoparsers__init__.py__init__.pyc__init__.pyoexpat.pyexpat.pycexpat.pyosax__init__.py__init__.pyc__init__.pyo_exceptions.py_exceptions.pyc_exceptions.pyoexpatreader.pyexpatreader.pycexpatreader.pyohandler.pyhandler.pychandler.pyosaxutils.pysaxutils.pycsaxutils.pyoxmlreader.pyxmlreader.pycxmlreader.pyo/usr/lib64/python2.7/lib-dynload//usr/lib64/python2.7//usr/lib64/python2.7/xml//usr/lib64/python2.7/xml/dom//usr/lib64/python2.7/xml/etree//usr/lib64/python2.7/xml/parsers//usr/lib64/python2.7/xml/sax/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:37853/SUSE_SLE-15_Update/60309471534e9d2a6d0f8a9c71cf578e-python-base.SUSE_SLE-15_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=c53fc087540b58030112378e3116ee672da4ec02, strippeddirectoryPython script, ASCII text executablepython 2.7 byte-compiledASCII text  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR,\.Z 'QlJutf-887a43e97945d7f922c2f738184f281f477090c257850ddb502af470b88ac6438?7zXZ !t/]"k%Ӆ) ֎lIG}wBSYzI; 1!xWhT=J !~CiDWWܯ e OmCkʤ8A/rd H!ՆC\H48e;+r2DŽ,FKؕ"JO4tN\n8vHhY݌֢솠8m)-iF%~(Th2t# LCb\ JF޶;Y5ej}Ds[ٸR 2w+ 0&E ";Ĥɱ]jKDNHھ7 ,!9_A/eQ7I_Flߐ=k Pʷ4kx J~IU@Lx1k$V"k>}eW{gкaS(0_ *ĩ~h}Q9nȤvT 'B׿UHZu`YIb~DxVX:KQ!} ƒQΚ4n# wTRE>z+\:=-TA݋pQ6׎k w f/pfP1pFd̸!!\o̮' 8?B}@>'rOCھ*87=/zQ=I=ȭKZ]{9U9usLc wy|7s"㛻o@|')LExn/=uW$޹urxH2*~{L5@^QD53~.țfJd1M-j2?q/5-8w5Ajz7JՏ~Vl9q w0uIַ p7jE3nA8,fIFh j,4!}ј,rA̟a]۪׈sԴE+п5WRM c AXqjZ{mv8'w^&w:!aN pŏY%J2$Br]T3|Wq FTL'!3*,Dm_caЏ*&۽#yfӀPB̡///Bȍ$w9F/9h4_G2Ml]"'zfu$=hA, M> QzSެo1~Az)1#Uas/%CɊ8V'ց+5zψu7sz e7ZZHHG?E ^1ryq9v_=#c[>u gjl&C':jB⸠\nl$qի 8]&9 +B6 YZ