Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package python312 for openSUSE:Factory 
checked in at 2026-03-09 16:12:56
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/python312 (Old)
 and      /work/SRC/openSUSE:Factory/.python312.new.8177 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "python312"

Mon Mar  9 16:12:56 2026 rev:44 rq:1337545 version:3.12.13

Changes:
--------
--- /work/SRC/openSUSE:Factory/python312/python312.changes      2026-02-18 
17:05:18.261410406 +0100
+++ /work/SRC/openSUSE:Factory/.python312.new.8177/python312.changes    
2026-03-09 16:13:09.457421876 +0100
@@ -1,0 +2,83 @@
+Fri Mar  6 19:20:34 UTC 2026 - Matej Cepl <[email protected]>
+
+- Update to 3.12.13:
+  - Python 3.12.13 final
+  - Release date: 2026-03-03
+  - Security
+    - gh-144125: BytesGenerator will now refuse to serialize
+      (write) headers that are unsafely folded or delimited; see
+      verify_generated_headers. (Contributed by Bas Bloemsaat and
+      Petr Viktorin in gh-121650).
+    - gh-143935: Fixed a bug in the folding of comments when
+      flattening an email message using a modern email policy.
+      Comments consisting of a very long sequence of non-foldable
+      characters could trigger a forced line wrap that omitted
+      the required leading space on the continuation line,
+      causing the remainder of the comment to be interpreted as
+      a new header field. This enabled header injection with
+      carefully crafted inputs (bsc#1257029 CVE-2025-11468).
+    - gh-143925: Reject control characters in data: URL media
+      types (bsc#1257046, CVE-2025-15282).
+    - gh-143919: Reject control characters in http.cookies.Morsel
+      fields and values (bsc#1257031, CVE-2026-0672).
+    - gh-143916: Reject C0 control characters within
+      wsgiref.headers.Headers fields, values, and parameters
+      (bsc#1257042, CVE-2026-0865).
+    - gh-142145: Remove quadratic behavior in xml.minidom node ID
+      cache clearing. In order to do this without breaking
+      existing users, we also add the ownerDocument attribute to
+      xml.dom.minidom elements and attributes created by directly
+      instantiating the Element or Attr class. Note that this way
+      of creating nodes is not supported; creator functions like
+      xml.dom.Document.documentElement() should be used instead
+      (bsc#1254997, CVE-2025-12084).
+    - gh-137836: Add support of the “plaintext” element, RAWTEXT
+      elements “xmp”, “iframe”, “noembed” and “noframes”, and
+      optionally RAWTEXT element “noscript” in
+      html.parser.HTMLParser.
+    - gh-136063: email.message: ensure linear complexity for
+      legacy HTTP parameters parsing. Patch by Bénédikt Tran.
+    - gh-136065: Fix quadratic complexity in
+      os.path.expandvars() (bsc#1252974, CVE-2025-6075).
+    - gh-119451: Fix a potential memory denial of service in the
+      http.client module. When connecting to a malicious server,
+      it could cause an arbitrary amount of memory to be
+      allocated. This could have led to symptoms including
+      a MemoryError, swapping, out of memory (OOM) killed
+      processes or containers, or even system crashes
+      (CVE-2025-13836, bsc#1254400).
+    - gh-119452: Fix a potential memory denial of service in the
+      http.server module. When a malicious user is connected to
+      the CGI server on Windows, it could cause an arbitrary
+      amount of memory to be allocated. This could have led to
+      symptoms including a MemoryError, swapping, out of memory
+      (OOM) killed processes or containers, or even system
+      crashes.
+    - gh-119342: Fix a potential memory denial of service in the
+      plistlib module. When reading a Plist file received from
+      untrusted source, it could cause an arbitrary amount of
+      memory to be allocated. This could have led to symptoms
+      including a MemoryError, swapping, out of memory (OOM)
+      killed processes or containers, or even system crashes
+      (bsc#1254401, CVE-2025-13837).
+  - Library
+    - gh-144833: Fixed a use-after-free in ssl when SSL_new()
+      returns NULL in newPySSLSocket(). The error was reported
+      via a dangling pointer after the object had already been
+      freed.
+    - gh-144363: Update bundled libexpat to 2.7.4
+    - gh-90949: Add SetAllocTrackerActivationThreshold() and
+      SetAllocTrackerMaximumAmplification() to xmlparser objects
+      to prevent use of disproportional amounts of dynamic memory
+      from within an Expat parser. Patch by Bénédikt Tran.
+- Remove upstreamed patches:
+  - CVE-2025-11468-email-hdr-fold-comment.patch
+  - CVE-2025-12084-minidom-quad-search.patch
+  - CVE-2025-13836-http-resp-cont-len.patch
+  - CVE-2025-13837-plistlib-mailicious-length.patch
+  - CVE-2025-6075-expandvars-perf-degrad.patch
+  - CVE-2026-0672-http-hdr-inject-cookie-Morsel.patch
+  - CVE-2026-0865-wsgiref-ctrl-chars.patch
+  - CVE-2025-15282-urllib-ctrl-chars.patch
+
+-------------------------------------------------------------------

Old:
----
  CVE-2025-11468-email-hdr-fold-comment.patch
  CVE-2025-12084-minidom-quad-search.patch
  CVE-2025-13836-http-resp-cont-len.patch
  CVE-2025-13837-plistlib-mailicious-length.patch
  CVE-2025-15282-urllib-ctrl-chars.patch
  CVE-2025-6075-expandvars-perf-degrad.patch
  CVE-2026-0672-http-hdr-inject-cookie-Morsel.patch
  CVE-2026-0865-wsgiref-ctrl-chars.patch
  Python-3.12.12.tar.xz
  Python-3.12.12.tar.xz.asc
  Python-3.12.12.tar.xz.sigstore

New:
----
  Python-3.12.13.tar.xz
  Python-3.12.13.tar.xz.asc
  Python-3.12.13.tar.xz.sigstore

----------(Old B)----------
  Old:- Remove upstreamed patches:
  - CVE-2025-11468-email-hdr-fold-comment.patch
  - CVE-2025-12084-minidom-quad-search.patch
  Old:  - CVE-2025-11468-email-hdr-fold-comment.patch
  - CVE-2025-12084-minidom-quad-search.patch
  - CVE-2025-13836-http-resp-cont-len.patch
  Old:  - CVE-2025-12084-minidom-quad-search.patch
  - CVE-2025-13836-http-resp-cont-len.patch
  - CVE-2025-13837-plistlib-mailicious-length.patch
  Old:  - CVE-2025-13836-http-resp-cont-len.patch
  - CVE-2025-13837-plistlib-mailicious-length.patch
  - CVE-2025-6075-expandvars-perf-degrad.patch
  Old:  - CVE-2026-0865-wsgiref-ctrl-chars.patch
  - CVE-2025-15282-urllib-ctrl-chars.patch
  Old:  - CVE-2025-13837-plistlib-mailicious-length.patch
  - CVE-2025-6075-expandvars-perf-degrad.patch
  - CVE-2026-0672-http-hdr-inject-cookie-Morsel.patch
  Old:  - CVE-2025-6075-expandvars-perf-degrad.patch
  - CVE-2026-0672-http-hdr-inject-cookie-Morsel.patch
  - CVE-2026-0865-wsgiref-ctrl-chars.patch
  Old:  - CVE-2026-0672-http-hdr-inject-cookie-Morsel.patch
  - CVE-2026-0865-wsgiref-ctrl-chars.patch
  - CVE-2025-15282-urllib-ctrl-chars.patch
----------(Old E)----------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ python312.spec ++++++
--- /var/tmp/diff_new_pack.Xi5mlS/_old  2026-03-09 16:13:11.049487434 +0100
+++ /var/tmp/diff_new_pack.Xi5mlS/_new  2026-03-09 16:13:11.053487599 +0100
@@ -118,7 +118,7 @@
 # _md5.cpython-38m-x86_64-linux-gnu.so
 %define dynlib() 
%{sitedir}/lib-dynload/%{1}.cpython-%{abi_tag}-%{archname}-%{_os}%{?_gnu}%{?armsuffix}.so
 Name:           %{python_pkg_name}%{psuffix}
-Version:        3.12.12
+Version:        3.12.13
 Release:        0
 Summary:        Python 3 Interpreter
 License:        Python-2.0
@@ -189,39 +189,15 @@
 Patch45:        bsc1243155-sphinx-non-determinism.patch
 # PATCH-FIX-OPENSUSE gh139257-Support-docutils-0.22.patch 
gh#python/cpython#139257 [email protected]
 Patch46:        gh139257-Support-docutils-0.22.patch
-# PATCH-FIX-UPSTREAM CVE-2025-6075-expandvars-perf-degrad.patch bsc#1252974 
[email protected]
-# Avoid potential quadratic complexity vulnerabilities in path modules
-Patch47:        CVE-2025-6075-expandvars-perf-degrad.patch
 # PATCH-FIX-UPSTREAM pass-test_write_read_limited_history.patch bsc#[0-9]+ 
[email protected]
 # Fix readline history truncation when length is reduced
 Patch48:        pass-test_write_read_limited_history.patch
-# PATCH-FIX-UPSTREAM CVE-2025-13836-http-resp-cont-len.patch bsc#1254400 
[email protected]
-# Avoid loading possibly compromised length of HTTP response
-Patch49:        CVE-2025-13836-http-resp-cont-len.patch
-# PATCH-FIX-UPSTREAM CVE-2025-12084-minidom-quad-search.patch bsc#1254997 
[email protected]
-# prevent quadratic behavior in node ID cache clearing 
-Patch50:        CVE-2025-12084-minidom-quad-search.patch
-# PATCH-FIX-UPSTREAM CVE-2025-13837-plistlib-mailicious-length.patch 
bsc#1254401 [email protected]
-# protect against OOM when loading malicious content
-Patch51:        CVE-2025-13837-plistlib-mailicious-length.patch 
-# PATCH-FIX-UPSTREAM CVE-2025-11468-email-hdr-fold-comment.patch bsc#1257029 
[email protected]
-# Email preserve parens when folding comments
-Patch52:        CVE-2025-11468-email-hdr-fold-comment.patch
 # PATCH-FIX-UPSTREAM CVE-2025-12781-b64decode-alt-chars.patch bsc#1257108 
[email protected]
 # Fix decoding with non-standard Base64 alphabet gh#python/cpython#125346
 Patch53:        CVE-2025-12781-b64decode-alt-chars.patch
-# PATCH-FIX-UPSTREAM CVE-2026-0672-http-hdr-inject-cookie-Morsel.patch 
bsc#1257031 [email protected]
-# Reject control characters in http cookies
-Patch54:        CVE-2026-0672-http-hdr-inject-cookie-Morsel.patch
-# PATCH-FIX-UPSTREAM CVE-2026-0865-wsgiref-ctrl-chars.patch bsc#1257042 
[email protected]
-# Reject control characters in wsgiref.headers.Headers
-Patch55:        CVE-2026-0865-wsgiref-ctrl-chars.patch
 # PATCH-FIX-UPSTREAM CVE-2025-15366-imap-ctrl-chars.patch bsc#1257044 
[email protected]
 # Reject control characters in wsgiref.headers.Headers
 Patch56:        CVE-2025-15366-imap-ctrl-chars.patch
-# PATCH-FIX-UPSTREAM CVE-2025-15282-urllib-ctrl-chars.patch bsc#1257046 
[email protected]
-# Reject control characters in urllib
-Patch57:        CVE-2025-15282-urllib-ctrl-chars.patch
 # PATCH-FIX-UPSTREAM CVE-2025-15367-poplib-ctrl-chars.patch bsc#1257041 
[email protected]
 # Reject control characters in poplib
 Patch58:        CVE-2025-15367-poplib-ctrl-chars.patch

++++++ CVE-2025-12781-b64decode-alt-chars.patch ++++++
--- /var/tmp/diff_new_pack.Xi5mlS/_old  2026-03-09 16:13:11.085488917 +0100
+++ /var/tmp/diff_new_pack.Xi5mlS/_new  2026-03-09 16:13:11.089489081 +0100
@@ -12,10 +12,10 @@
  Misc/NEWS.d/next/Library/2025-11-06-12-03-29.gh-issue-125346.7Gfpgw.rst |    
5 +
  4 files changed, 91 insertions(+), 14 deletions(-)
 
-Index: Python-3.12.12/Doc/library/base64.rst
+Index: Python-3.12.13/Doc/library/base64.rst
 ===================================================================
---- Python-3.12.12.orig/Doc/library/base64.rst 2025-10-09 13:07:00.000000000 
+0200
-+++ Python-3.12.12/Doc/library/base64.rst      2026-02-10 22:15:41.801235355 
+0100
+--- Python-3.12.13.orig/Doc/library/base64.rst 2026-03-03 13:39:30.000000000 
+0100
++++ Python-3.12.13/Doc/library/base64.rst      2026-03-06 20:24:47.155493487 
+0100
 @@ -74,15 +74,20 @@
     A :exc:`binascii.Error` exception is raised
     if *s* is incorrectly padded.
@@ -52,10 +52,10 @@
  
  .. function:: b32encode(s)
  
-Index: Python-3.12.12/Lib/base64.py
+Index: Python-3.12.13/Lib/base64.py
 ===================================================================
---- Python-3.12.12.orig/Lib/base64.py  2026-02-10 22:15:02.534016402 +0100
-+++ Python-3.12.12/Lib/base64.py       2026-02-10 22:15:41.801591556 +0100
+--- Python-3.12.13.orig/Lib/base64.py  2026-03-06 20:21:12.189779055 +0100
++++ Python-3.12.13/Lib/base64.py       2026-03-06 20:24:47.156270051 +0100
 @@ -71,20 +71,39 @@
      The result is returned as a bytes object.  A binascii.Error is raised if
      s is incorrectly padded.
@@ -121,10 +121,10 @@
  
  
  
-Index: Python-3.12.12/Lib/test/test_base64.py
+Index: Python-3.12.13/Lib/test/test_base64.py
 ===================================================================
---- Python-3.12.12.orig/Lib/test/test_base64.py        2026-02-10 
22:15:04.364274059 +0100
-+++ Python-3.12.12/Lib/test/test_base64.py     2026-02-10 22:17:42.445725550 
+0100
+--- Python-3.12.13.orig/Lib/test/test_base64.py        2026-03-06 
20:21:14.072714339 +0100
++++ Python-3.12.13/Lib/test/test_base64.py     2026-03-06 20:24:47.156769814 
+0100
 @@ -232,6 +232,25 @@
                                 b'\xd3V\xbeo\xf7\x1d')
          self.check_decode_type_errors(base64.urlsafe_b64decode)
@@ -181,10 +181,10 @@
  
      def test_b32encode(self):
          eq = self.assertEqual
-Index: 
Python-3.12.12/Misc/NEWS.d/next/Library/2025-11-06-12-03-29.gh-issue-125346.7Gfpgw.rst
+Index: 
Python-3.12.13/Misc/NEWS.d/next/Library/2025-11-06-12-03-29.gh-issue-125346.7Gfpgw.rst
 ===================================================================
 --- /dev/null  1970-01-01 00:00:00.000000000 +0000
-+++ 
Python-3.12.12/Misc/NEWS.d/next/Library/2025-11-06-12-03-29.gh-issue-125346.7Gfpgw.rst
     2026-02-10 22:15:41.802353823 +0100
++++ 
Python-3.12.13/Misc/NEWS.d/next/Library/2025-11-06-12-03-29.gh-issue-125346.7Gfpgw.rst
     2026-03-06 20:24:47.157181851 +0100
 @@ -0,0 +1,5 @@
 +Accepting ``+`` and ``/`` characters with an alternative alphabet in
 +:func:`base64.b64decode` and :func:`base64.urlsafe_b64decode` is now

++++++ CVE-2025-15366-imap-ctrl-chars.patch ++++++
--- /var/tmp/diff_new_pack.Xi5mlS/_old  2026-03-09 16:13:11.217494352 +0100
+++ /var/tmp/diff_new_pack.Xi5mlS/_new  2026-03-09 16:13:11.269496494 +0100
@@ -8,10 +8,10 @@
  Misc/NEWS.d/next/Security/2026-01-16-11-41-06.gh-issue-143921.AeCOor.rst |    
1 +
  2 files changed, 4 insertions(+), 1 deletion(-)
 
-Index: Python-3.12.12/Lib/imaplib.py
+Index: Python-3.12.13/Lib/imaplib.py
 ===================================================================
---- Python-3.12.12.orig/Lib/imaplib.py 2026-02-10 22:15:03.417592955 +0100
-+++ Python-3.12.12/Lib/imaplib.py      2026-02-10 22:18:02.094605035 +0100
+--- Python-3.12.13.orig/Lib/imaplib.py 2026-03-06 20:21:13.076797807 +0100
++++ Python-3.12.13/Lib/imaplib.py      2026-03-06 20:25:14.549622415 +0100
 @@ -132,7 +132,7 @@
  # We compile these in _mode_xxx.
  _Literal = br'.*{(?P<size>\d+)}$'
@@ -30,10 +30,10 @@
              data = data + b' ' + arg
  
          literal = self.literal
-Index: 
Python-3.12.12/Misc/NEWS.d/next/Security/2026-01-16-11-41-06.gh-issue-143921.AeCOor.rst
+Index: 
Python-3.12.13/Misc/NEWS.d/next/Security/2026-01-16-11-41-06.gh-issue-143921.AeCOor.rst
 ===================================================================
 --- /dev/null  1970-01-01 00:00:00.000000000 +0000
-+++ 
Python-3.12.12/Misc/NEWS.d/next/Security/2026-01-16-11-41-06.gh-issue-143921.AeCOor.rst
    2026-02-10 22:18:02.095167966 +0100
++++ 
Python-3.12.13/Misc/NEWS.d/next/Security/2026-01-16-11-41-06.gh-issue-143921.AeCOor.rst
    2026-03-06 20:25:14.550097371 +0100
 @@ -0,0 +1 @@
 +Reject control characters in IMAP commands.
 

++++++ CVE-2025-15367-poplib-ctrl-chars.patch ++++++
--- /var/tmp/diff_new_pack.Xi5mlS/_old  2026-03-09 16:13:11.397501764 +0100
+++ /var/tmp/diff_new_pack.Xi5mlS/_new  2026-03-09 16:13:11.453504071 +0100
@@ -9,10 +9,10 @@
  Misc/NEWS.d/next/Security/2026-01-16-11-43-47.gh-issue-143923.DuytMe.rst |    
1 +
  3 files changed, 11 insertions(+)
 
-Index: Python-3.12.12/Lib/poplib.py
+Index: Python-3.12.13/Lib/poplib.py
 ===================================================================
---- Python-3.12.12.orig/Lib/poplib.py  2026-02-11 23:46:29.442215955 +0100
-+++ Python-3.12.12/Lib/poplib.py       2026-02-11 23:46:46.713251058 +0100
+--- Python-3.12.13.orig/Lib/poplib.py  2026-03-06 20:21:13.491889752 +0100
++++ Python-3.12.13/Lib/poplib.py       2026-03-06 20:25:33.388287765 +0100
 @@ -122,6 +122,8 @@
      def _putcmd(self, line):
          if self._debugging: print('*cmd*', repr(line))
@@ -22,10 +22,10 @@
          self._putline(line)
  
  
-Index: Python-3.12.12/Lib/test/test_poplib.py
+Index: Python-3.12.13/Lib/test/test_poplib.py
 ===================================================================
---- Python-3.12.12.orig/Lib/test/test_poplib.py        2026-02-11 
23:46:31.636412813 +0100
-+++ Python-3.12.12/Lib/test/test_poplib.py     2026-02-11 23:46:46.713442229 
+0100
+--- Python-3.12.13.orig/Lib/test/test_poplib.py        2026-03-06 
20:21:15.497803691 +0100
++++ Python-3.12.13/Lib/test/test_poplib.py     2026-03-06 20:25:33.389775036 
+0100
 @@ -17,6 +17,7 @@
  from test.support import threading_helper
  from test.support import asynchat
@@ -48,10 +48,10 @@
      @requires_ssl
      def test_stls_capa(self):
          capa = self.client.capa()
-Index: 
Python-3.12.12/Misc/NEWS.d/next/Security/2026-01-16-11-43-47.gh-issue-143923.DuytMe.rst
+Index: 
Python-3.12.13/Misc/NEWS.d/next/Security/2026-01-16-11-43-47.gh-issue-143923.DuytMe.rst
 ===================================================================
 --- /dev/null  1970-01-01 00:00:00.000000000 +0000
-+++ 
Python-3.12.12/Misc/NEWS.d/next/Security/2026-01-16-11-43-47.gh-issue-143923.DuytMe.rst
    2026-02-11 23:46:46.713620996 +0100
++++ 
Python-3.12.13/Misc/NEWS.d/next/Security/2026-01-16-11-43-47.gh-issue-143923.DuytMe.rst
    2026-03-06 20:25:33.390103395 +0100
 @@ -0,0 +1 @@
 +Reject control characters in POP3 commands.
 

++++++ Python-3.12.12.tar.xz -> Python-3.12.13.tar.xz ++++++
/work/SRC/openSUSE:Factory/python312/Python-3.12.12.tar.xz 
/work/SRC/openSUSE:Factory/.python312.new.8177/Python-3.12.13.tar.xz differ: 
char 29, line 1

++++++ Python-3.12.12.tar.xz.sigstore -> Python-3.12.13.tar.xz.sigstore ++++++
--- /work/SRC/openSUSE:Factory/python312/Python-3.12.12.tar.xz.sigstore 
2025-10-17 17:25:34.725477666 +0200
+++ 
/work/SRC/openSUSE:Factory/.python312.new.8177/Python-3.12.13.tar.xz.sigstore   
    2026-03-09 16:13:09.137408698 +0100
@@ -1 +1 @@
-{"mediaType": "application/vnd.dev.sigstore.bundle.v0.3+json", 
"verificationMaterial": {"certificate": {"rawBytes": 
"MIICyjCCAlCgAwIBAgIUa7XmzWlmoxbdaf7Bd0cb7k2SJX0wCgYIKoZIzj0EAwMwNzEVMBMGA1UEChMMc2lnc3RvcmUuZGV2MR4wHAYDVQQDExVzaWdzdG9yZS1pbnRlcm1lZGlhdGUwHhcNMjUxMDA5MTEzOTEwWhcNMjUxMDA5MTE0OTEwWjAAMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEnnBupfHW0kIyKIch4g4bg/VMzmQSN3W+fDXSBXPHKVV01duW4mnJBNAx8dOjaDQJbbGLCL3nHReR6AHY5EzzWKOCAW8wggFrMA4GA1UdDwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzAdBgNVHQ4EFgQUxS1GFV6/403CJB2LIriD0Yxys+kwHwYDVR0jBBgwFoAU39Ppz1YkEZb5qNjpKFWixi4YZD8wHwYDVR0RAQH/BBUwE4ERdGhvbWFzQHB5dGhvbi5vcmcwKQYKKwYBBAGDvzABAQQbaHR0cHM6Ly9hY2NvdW50cy5nb29nbGUuY29tMCsGCisGAQQBg78wAQgEHQwbaHR0cHM6Ly9hY2NvdW50cy5nb29nbGUuY29tMIGKBgorBgEEAdZ5AgQCBHwEegB4AHYA3T0wasbHETJjGR4cmWc3AqJKXrjePK3/h4pygC8p7o4AAAGZyMSWqQAABAMARzBFAiEAgP3Zja0sZ42WlEujGWIbBp+3AemF4BPwFlVMLG/criwCIDSK9BOHosQgvpZnN+hpQrqZdHZ7j1QXaxWfcERObDGrMAoGCCqGSM49BAMDA2gAMGUCMC/Fx5Bbae7C7w5CjzPgAIRB8sAV5THF7EynHjFxBqjwYhiMblyn5lzw
 
pTsSpcGyiQIxAMtPBAMZXbJeY8LL/rTmrqaS+gvUCFZe430pf/7njbi+vMTsnX6lbyDW6+MBPf2w0Q=="},
 "tlogEntries": [{"logIndex": "597445409", "logId": {"keyId": 
"wNI9atQGlz+VWfO6LRygH4QUfY/8W4RFwiT5i5WRgB0="}, "kindVersion": {"kind": 
"hashedrekord", "version": "0.0.1"}, "integratedTime": "1760009951", 
"inclusionPromise": {"signedEntryTimestamp": 
"MEQCICmAn/SSLFYafnAtkPRYmvBAv34ZqQsxnCKxA6lvOwtIAiADgWJmj7xnSimwJjyYMND/62BSa6VAn+yiurqa+3sFbg=="},
 "inclusionProof": {"logIndex": "475541147", "rootHash": 
"NtKq0OO26YDo37dp00CxEkih9ardFvhT06bm+f1SQDE=", "treeSize": "475541154", 
"hashes": ["NslcefFuKuND6JRNbUSPjLrHeL0W18bCD4VhxfCcQKk=", 
"A0S2uABqcbgE1HPfloLBAk0TlXFJVl7yLEBondSsQ0c=", 
"6sWxX6Qc03LZeNbyN5W9cj7IZtqLYjkxFKvRS3ynzso=", 
"sdBvJFo0UwZVcXbz5NwqW/k4wRKwjiBjYIlN9G6hzXc=", 
"HSc04gOheRI34V7k9W+RDSDZFEf2I9JjEEOdGOMAUCA=", 
"C0KrXbTnn0FjHCn6Pk8TOEPndNLUliSsS1kLpaoeFho=", 
"/lb6eJIa9/379KwZZThJl+TJzpB0p9sLsW59J4AkleA=", 
"60XcwfvS6KRVEutb85dCHmflKO/pCJu3wP/wi71Hjjw=", 
"T5+n1/blJViw8vobIXjJuar7GB5qkWPWxuPI4TL
 uIus=", "N/HdEEbPrOhis60vsOpblzzFJ5Gn0VF1X5o/a5zj5ho=", 
"5iV4XGoB9mnKM5YryHN+GB7tIaTkjbMhbGbF01zhzKU=", 
"qXhJobQjWl6SO/pue3trUW2uL4jXx24Ip7lpd4hc5bU=", 
"56ObhlROm9L8Q4JyN+mxEQ5pZD5QdobB1xZFIeL0lVg=", 
"EGaD/cNavzxGYLx1Gl0uNNWBZvyXlSHSdlIeH7m+63A=", 
"2Wv4GiithwNukRKV06clevnQQYCzXmSS/+/OJtXgsXQ=", 
"1mfy94KpcItqshH9+gwqV6jccupcaMpVsF28New8zDY=", 
"vS7O4ozHIQZJWBiov+mkpI27GE8zAmVCEkRcP3NDyNE="], "checkpoint": {"envelope": 
"rekor.sigstore.dev - 
1193050959916656506\n475541154\nNtKq0OO26YDo37dp00CxEkih9ardFvhT06bm+f1SQDE=\n\n\u2014
 rekor.sigstore.dev 
wNI9ajBFAiBAXkd6xMHjC/fa3mQGVYRGINSGMy5E39T2cwLfMJUCdAIhAJ8pLs5eiFWKL+RH/M/yyicyskpEIjumbkignFyjP+fn\n"}},
 "canonicalizedBody": 
"eyJhcGlWZXJzaW9uIjoiMC4wLjEiLCJraW5kIjoiaGFzaGVkcmVrb3JkIiwic3BlYyI6eyJkYXRhIjp7Imhhc2giOnsiYWxnb3JpdGhtIjoic2hhMjU2IiwidmFsdWUiOiJmYjg1YTEzNDE0YjAyOGM0OWJhMThiYmQ1MjNjMmQwNTVhMzBiNTZiMThiOTJjZTQ1NGVhMmM1MWVkYzY1NmM0In19LCJzaWduYXR1cmUiOnsiY29udGVudCI6Ik1FVUNJUUNzSysxcVRmNGZHd2I1eTBuaHpiQXdKa1hucGUydDYzZU96a3VrQ2Q5bFNR
 
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
 
1pFZG9kbUpYUm5wUlNFSTFaRWRvZG1KcE5YWmpiV04zUzFGWlMwdDNXVUpDUVVkRWRucEJRZ3BCVVZGaVlVaFNNR05JVFRaTWVUbG9XVEpPZG1SWE5UQmplVFZ1WWpJNWJtSkhWWFZaTWpsMFRVTnpSME5wYzBkQlVWRkNaemM0ZDBGUlowVklVWGRpQ21GSVVqQmpTRTAyVEhrNWFGa3lUblprVnpVd1kzazFibUl5T1c1aVIxVjFXVEk1ZEUxSlIwdENaMjl5UW1kRlJVRmtXalZCWjFGRFFraDNSV1ZuUWpRS1FVaFpRVE5VTUhkaGMySklSVlJLYWtkU05HTnRWMk16UVhGS1MxaHlhbVZRU3pNdmFEUndlV2RET0hBM2J6UkJRVUZIV25sTlUxZHhVVUZCUWtGTlFRcFNla0pHUVdsRlFXZFFNMXBxWVRCeldqUXlWMnhGZFdwSFYwbGlRbkFyTTBGbGJVWTBRbEIzUm14V1RVeEhMMk55YVhkRFNVUlRTemxDVDBodmMxRm5Dblp3V201T0syaHdVWEp4V21SSVdqZHFNVkZZWVhoWFptTkZVazlpUkVkeVRVRnZSME5EY1VkVFRUUTVRa0ZOUkVFeVowRk5SMVZEVFVNdlJuZzFRbUlLWVdVM1F6ZDNOVU5xZWxCblFVbFNRamh6UVZZMVZFaEdOMFY1YmtocVJuaENjV3AzV1docFRXSnNlVzQxYkhwM2NGUnpVM0JqUjNscFVVbDRRVTEwVUFwQ1FVMWFXR0pLWlZrNFRFd3ZjbFJ0Y25GaFV5dG5kbFZEUmxwbE5ETXdjR1l2TjI1cVlta3JkazFVYzI1WU5teGllVVJYTml0TlFsQm1NbmN3VVQwOUNpMHRMUzB0UlU1RUlFTkZVbFJKUmtsRFFWUkZMUzB0TFMwSyJ9fX19"}],
 "timestampVerificationData": {}}, "messageSignature": {"m
 essageDigest": {"algorithm": "SHA2_256", "digest": 
"+4WhNBSwKMSboYu9UjwtBVowtWsYuSzkVOosUe3GVsQ="}, "signature": 
"MEUCIQCsK+1qTf4fGwb5y0nhzbAwJkXnpe2t63eOzkukCd9lSQIgCO3QoxnLW6oAr2M20S//y8iDUKEGe3pipLwC/+zmLnA="}}
+{"mediaType": "application/vnd.dev.sigstore.bundle.v0.3+json", 
"verificationMaterial": {"certificate": {"rawBytes": 
"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
 
W6gs3oJFeYcCMC/oCuy0KqaSKLjL+Bjkw206Xydj9Wcxzi6n/HeqnxiZrBz790kpkwjsxOJnaUIQyg=="},
 "tlogEntries": [{"logIndex": "1017907816", "logId": {"keyId": 
"wNI9atQGlz+VWfO6LRygH4QUfY/8W4RFwiT5i5WRgB0="}, "kindVersion": {"kind": 
"hashedrekord", "version": "0.0.1"}, "integratedTime": "1772543540", 
"inclusionPromise": {"signedEntryTimestamp": 
"MEYCIQDT7wtacuqV+7MUnwBq5Rqq3l63sLEGHZI1XuWp0421qgIhAP1/dl8he7N/t5VMUhca4SFy/Wd1VCYHhB8pvaVeTnG6"},
 "inclusionProof": {"logIndex": "896003554", "rootHash": 
"dduWJQVh9hToIh7KBktgBf1ZmjzxXKBtY6RlC8Qvck8=", "treeSize": "896003562", 
"hashes": ["c24gaFO/5zpzzLClPoHIHcfL0tXHo4KM0fe1kRP1mXA=", 
"2TTK3bhgXfKMKbX6Sykzb4FK7KWTGFwZt3cL6RDnrhQ=", 
"UDmpPuP1lUhqv/P+G1TT3lwHHar8e66rgtFoftcCyFA=", 
"1cimjEHaKfeVzMwQ2g5aNI2AY+mKuyefuKu4bl3dYYY=", 
"ov3364KQKY67aOFB2yraPDt2tN2J3ubsoFc0Qz4Uyqc=", 
"QDY5M9oZY+lj4k8u1dw8TLSPZMx2RaFU6azxmtI/DYk=", 
"wjOmQYl/uPBoLszh0aCCIaStXoKgMBx2hr8/yd8mrxw=", 
"SWlkQuEKVKLExEBBYik+E2ntQcWU8FXaStLk5OR58Hw=", 
"TT/C2pqjIfvIL3alv8+8t803UUA+J7F3G3RJBG
 X47qo=", "QIvLvG9kOJaMYUH84Qv3nYMwHBgvO09NBWZgAQxV/XQ=", 
"Xu3Ph++KXQYw4sr2FXO+m6ejdFnRdvIq0sNIXZ3JPeI=", 
"X/ABFC6+4cGeNLxsbeuvEES5P1gqWZNVz354NrulKvs=", 
"JRrqNWh/H7qLgers5uYHsZhlBeUG0Iq15/rzmx5nOnM=", 
"zqeC5oCJfF7U0j+xFOZMczDTNKLpXtPqv1Bm2CRa+q8=", 
"3MUmJMn+WmTO/xZck3ZnB+/1ODBh1XagFTFyOYA8fGg=", 
"9kv572LTRu9iSxQwHZ/9IjIVAil7jC0UKQGvJ1+OSIc=", 
"Qiu5gIc/ZjU7HM63IWVs3PCkgNTV4cY0dnn0aOI66WY=", 
"TowAI7Ml+oo4i97aYU8IPGwFN1B4qy+pdx75ciLu3E8=", 
"Xo5tam8gxbsWohATkFEqn5hvHpPFwBJ0SDjNE5DiI2A=", 
"ZleKYeRKwUF3HP3HO0kxHMVeJgY3N/euGinVhlVWaq0=", 
"fLAvE46NqCVV86EpB2pKkwJlFjjFk7ntX3lC+PiZuIo=", 
"T4DqWD42hAtN+vX8jKCWqoC4meE4JekI9LxYGCcPy1M="], "checkpoint": {"envelope": 
"rekor.sigstore.dev - 
1193050959916656506\n896003562\ndduWJQVh9hToIh7KBktgBf1ZmjzxXKBtY6RlC8Qvck8=\n\n\u2014
 rekor.sigstore.dev 
wNI9ajBEAiBkoWZ7HDLN0R8PyB2wRfwbnaOwvM8cdqelTzCaeOAFzQIgREZTN2XN/tZDjqkuie8cGAVFpOtF05VIsGCgvUZX9+s=\n"}},
 "canonicalizedBody": 
"eyJhcGlWZXJzaW9uIjoiMC4wLjEiLCJraW5kIjoiaGFzaGVkcmVrb3JkIiwic3BlYyI6eyJkYXRhIjp
 
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
 
kRUVU12YndwRGRYa3dTM0ZoVTB0TWFrd3JRbXByZHpJd05saDVaR281VjJONGVtazJiaTlJWlhGdWVHbGFja0o2Tnprd2EzQnJkMnB6ZUU5S2JtRlZTVkY1WnowOUNpMHRMUzB0UlU1RUlFTkZVbFJKUmtsRFFWUkZMUzB0TFMwSyJ9fX19"}],
 "timestampVerificationData": {}}, "messageSignature": {"messageDigest": 
{"algorithm": "SHA2_256", "digest": 
"wIvGWoGXHB3VeDGCgmUDNpRmx+ZzdNFkZRmt8FIHtoQ="}, "signature": 
"MEUCIQDi7qDkG7Pd/hJbbuB+C0fQul9Th9pcnwcb4AZgHV4/OQIgaT7jfH4qgPmbNHNco1i1WVu53KvAjr5mPHDeAqV9E8o="}}

++++++ _scmsync.obsinfo ++++++
--- /var/tmp/diff_new_pack.Xi5mlS/_old  2026-03-09 16:13:12.653553487 +0100
+++ /var/tmp/diff_new_pack.Xi5mlS/_new  2026-03-09 16:13:12.701555464 +0100
@@ -1,6 +1,6 @@
-mtime: 1770850038
-commit: 07beab470daf1bea6b0fbc6af7e3bd5f0a9f708806d74c128490c9fb47a3bd6d
+mtime: 1773008663
+commit: 53394ceb74e19d745dcf80b4b7e237c4074e50048aeb3db3d4684366cbe30ec2
 url: https://src.opensuse.org/python-interpreters/python312.git
-revision: 07beab470daf1bea6b0fbc6af7e3bd5f0a9f708806d74c128490c9fb47a3bd6d
+revision: 53394ceb74e19d745dcf80b4b7e237c4074e50048aeb3db3d4684366cbe30ec2
 projectscmsync: https://src.opensuse.org/python-interpreters/_ObsPrj
 

++++++ build.specials.obscpio ++++++

++++++ build.specials.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/.gitignore new/.gitignore
--- old/.gitignore      1970-01-01 01:00:00.000000000 +0100
+++ new/.gitignore      2026-03-08 23:24:34.000000000 +0100
@@ -0,0 +1,5 @@
+.osc
+*.obscpio
+_build.*
+.pbuild
+python312-3.12.*-build

++++++ fix_configure_rst.patch ++++++
--- /var/tmp/diff_new_pack.Xi5mlS/_old  2026-03-09 16:13:13.629593678 +0100
+++ /var/tmp/diff_new_pack.Xi5mlS/_new  2026-03-09 16:13:13.705596808 +0100
@@ -3,10 +3,10 @@
  Misc/NEWS               |    2 +-
  2 files changed, 1 insertion(+), 3 deletions(-)
 
-Index: Python-3.12.12/Doc/using/configure.rst
+Index: Python-3.12.13/Doc/using/configure.rst
 ===================================================================
---- Python-3.12.12.orig/Doc/using/configure.rst        2025-10-09 
13:07:00.000000000 +0200
-+++ Python-3.12.12/Doc/using/configure.rst     2025-11-15 16:08:56.030736737 
+0100
+--- Python-3.12.13.orig/Doc/using/configure.rst        2026-03-06 
20:22:08.230317302 +0100
++++ Python-3.12.13/Doc/using/configure.rst     2026-03-06 20:22:22.242697945 
+0100
 @@ -640,13 +640,11 @@
  
  See ``Mac/README.rst``.
@@ -21,11 +21,11 @@
  .. option:: --enable-framework=INSTALLDIR
  
     Create a Python.framework rather than a traditional Unix install. Optional
-Index: Python-3.12.12/Misc/NEWS
+Index: Python-3.12.13/Misc/NEWS
 ===================================================================
---- Python-3.12.12.orig/Misc/NEWS      2025-10-09 13:07:00.000000000 +0200
-+++ Python-3.12.12/Misc/NEWS   2025-11-15 16:08:56.040736728 +0100
-@@ -15234,7 +15234,7 @@
+--- Python-3.12.13.orig/Misc/NEWS      2026-03-06 20:22:08.230317302 +0100
++++ Python-3.12.13/Misc/NEWS   2026-03-06 20:22:22.248451941 +0100
+@@ -15317,7 +15317,7 @@
  - bpo-40939: Removed documentation for the removed ``PyParser_*`` C API.
  
  - bpo-43795: The list in :ref:`limited-api-list` now shows the public name

++++++ pass-test_write_read_limited_history.patch ++++++
--- /var/tmp/diff_new_pack.Xi5mlS/_old  2026-03-09 16:13:14.225618221 +0100
+++ /var/tmp/diff_new_pack.Xi5mlS/_new  2026-03-09 16:13:14.289620857 +0100
@@ -1,7 +1,11 @@
-Index: Python-3.12.12/Modules/readline.c
+---
+ Modules/readline.c |   23 +++++++++++++++++++++++
+ 1 file changed, 23 insertions(+)
+
+Index: Python-3.12.13/Modules/readline.c
 ===================================================================
---- Python-3.12.12.orig/Modules/readline.c     2025-11-19 20:17:29.982940492 
+0100
-+++ Python-3.12.12/Modules/readline.c  2025-11-19 20:36:46.627307300 +0100
+--- Python-3.12.13.orig/Modules/readline.c     2026-03-03 13:39:30.000000000 
+0100
++++ Python-3.12.13/Modules/readline.c  2026-03-06 20:22:54.135627806 +0100
 @@ -145,6 +145,8 @@
  
  #define readlinestate_global ((readlinestate 
*)PyModule_GetState(PyState_FindModule(&readlinemodule)))

Reply via email to