1
0

Compare commits

...

16 Commits

Author SHA256 Message Date
Marcus Meissner
c8f2353703 remove golang-github-prometheus-prometheus from blacklist 2025-12-10 16:18:39 +00:00
01348e5949 Update patchinfo incident numbers [skip actions] 2025-12-10 09:21:09 +00:00
AutoGits PR Review Bot
1e27862c42 Merging
PR: products/PackageHub!272
2025-12-10 09:20:48 +00:00
46e4106db3 Update patchinfo incident numbers [skip actions] 2025-12-10 08:41:44 +00:00
AutoGits PR Review Bot
764328e284 Merging
PR: products/PackageHub!263
2025-12-10 08:41:26 +00:00
feedd4ca39 Update patchinfo.20251209165835367165.93181000773252/_patchinfo
remove seperate_build_arch from patchinfo
2025-12-10 09:33:03 +01:00
79e36c0fe2 Update submodules from pool/exim#2 and create patchinfo.20251209165835367165.93181000773252/_patchinfo 2025-12-09 17:59:14 +01:00
021c63e2c2 Update patchinfo incident numbers [skip actions] 2025-12-09 13:29:30 +00:00
AutoGits PR Review Bot
eaf12474ff Merging
PR: products/PackageHub!265
2025-12-09 13:29:11 +00:00
19e2bfc867 Merge branch 'leap-16.0' into maintenance-update-1764931152 2025-12-09 10:24:44 +01:00
9d5e502d5d Update patchinfo incident numbers [skip actions] 2025-12-09 08:16:58 +00:00
AutoGits PR Review Bot
92c12b23ba Merging
PR: products/PackageHub!222
2025-12-09 08:16:20 +00:00
0da9f5542f Update submodules from pool/python-Django#3 and create patchinfo.20251208125318499450.93181000773252/_patchinfo 2025-12-08 13:55:36 +01:00
74b322a7d3 Update submodules from pool/trivy#27 and create patchinfo.20251205103932570835.187004354831441/_patchinfo 2025-12-08 13:45:09 +01:00
c8a509cefa Update patchinfo.20251117132509463589.187004354831441/_patchinfo
remove seperate buildarch
2025-11-17 14:43:58 +01:00
6a6ae3204b Update submodules from pool/perl-Mojolicious-Plugin-Webpack#1 and create patchinfo.20251117132509463589.187004354831441/_patchinfo 2025-11-17 14:25:16 +01:00
9 changed files with 176 additions and 6 deletions

View File

@@ -1408,7 +1408,6 @@ packagesets:
- gobject-introspection-devel
- golang-github-cpuguy83-go-md2man
- golang-github-google-jsonnet
- golang-github-prometheus-prometheus
- golang-github-prometheus-promu
- golang-packaging
- google-errorprone-annotation
@@ -7080,7 +7079,6 @@ packagesets:
- system-user-news
- system-user-nobody
- system-user-ntp
- system-user-prometheus
- system-user-pulse
- system-user-qemu
- system-user-root

2
exim

Submodule exim updated: 9f3f61dcb2...aa2daa7cec

View File

@@ -0,0 +1,14 @@
<patchinfo incident="packagehub-49">
<packager>okurz</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for perl-Mojolicious-Plugin-Webpack</summary>
<description>This update for perl-Mojolicious-Plugin-Webpack fixes the following issues:
Changes in perl-Mojolicious-Plugin-Webpack:
- See https://github.com/jhthorsen/mojolicious-plugin-webpack/pull/17
</description>
<package>perl-Mojolicious-Plugin-Webpack</package>
</patchinfo>

View File

@@ -0,0 +1,127 @@
<patchinfo incident="packagehub-51">
<packager>dirkmueller</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for trivy</summary>
<description>This update for trivy fixes the following issues:
Changes in trivy:
Update to version 0.68.1:
* fix: update cosing settings for GoReleaser after bumping cosing to v3 (#9863)
* chore(deps): bump the testcontainers group with 2 updates (#9506)
* feat(aws): Add support for dualstack ECR endpoints (#9862)
* fix(vex): use a separate `visited` set for each DFS path (#9760)
* docs: catch some missed docs -&gt; guide (#9850)
* refactor(misconf): parse azure_policy_enabled to addonprofile.azurepolicy.enabled (#9851)
* chore(cli): Remove Trivy Cloud (#9847)
* fix(misconf): ensure value used as ignore marker is non-null and known (#9835)
* fix(misconf): map healthcheck start period flag to --start-period instead of --startPeriod (#9837)
* chore(deps): bump the docker group with 3 updates (#9776)
* chore(deps): bump golang.org/x/crypto from 0.41.0 to 0.45.0 (#9827)
* chore(deps): bump the common group across 1 directory with 20 updates (#9840)
* feat(image): add Sigstore bundle SBOM support (#9516)
* chore(deps): bump the aws group with 7 updates (#9691)
* test(k8s): update k8s integrtion test (#9725)
* chore(deps): bump github.com/containerd/containerd from 1.7.28 to 1.7.29 (#9764)
* feat(sbom): add support for SPDX attestations (#9829)
* docs(misconf): Remove duplicate sections (#9819)
* feat(misconf): Update Azure network schema for new checks (#9791)
* feat(misconf): Update AppService schema (#9792)
* fix(misconf): ensure boolean metadata values are correctly interpreted (#9770)
* feat(misconf): support https_traffic_only_enabled in Az storage account (#9784)
* docs: restructure docs for new hosting (#9799)
* docs(server): fix info about scanning licenses on the client side. (#9805)
* ci: remove unused preinstalled software/images for build tests to free up disk space. (#9814)
* feat(report): add fingerprint generation for vulnerabilities (#9794)
* chore: trigger the trivy-www workflow (#9737)
* fix: update all documentation links (#9777)
* feat(suse): Add new openSUSE, Micro and SLES releases end of life dates (#9788)
* test(go): set `GOPATH` for tests (#9785)
* feat(flag): add `--cacert` flag (#9781)
* fix(misconf): handle unsupported experimental flags in Dockerfile (#9769)
* test(go): refactor mod_test.go to use txtar format (#9775)
* docs: Fix typos and linguistic errors in documentation / hacktoberfest (#9586)
* chore(deps): bump github.com/opencontainers/selinux from 1.12.0 to 1.13.0 (#9778)
* chore(deps): bump github.com/containerd/containerd/v2 from 2.1.4 to 2.1.5 (#9763)
* fix(java): use `true` as default value for Repository Release|Snapshot Enabled in pom.xml and settings.xml files (#9751)
* docs: add info that `SSL_CERT_FILE` works on `Unix systems other than macOS` only (#9772)
* docs: change SecObserve URLs in documentatio (#9771)
* feat(db): enable concurrent access to vulnerability database (#9750)
* feat(misconf): add agentpools to azure container schema (#9714)
* feat(report): switch ReportID from UUIDv4 to UUIDv7 (#9749)
* feat(misconf): Update Azure Compute schema (#9675)
* feat(misconf): Update azure storage schema (#9728)
* feat(misconf): Update SecurityCenter schema (#9674)
* feat(image): pass global context to docker/podman image save func (#9733)
* chore(deps): bump the github-actions group with 4 updates (#9739)
* fix(flag): remove viper.SetDefault to fix IsSet() for config-only flags (#9732)
* feat(license): use separate SPDX ids to ignore SPDX expressions (#9087)
* feat(dotnet): add dependency graph support for .deps.json files (#9726)
* feat(misconf): Add support for configurable Rego error limit (#9657)
* feat(misconf): Add RoleAssignments attribute (#9396)
* feat(report): add image reference to report metadata (#9729)
* fix(os): Add photon 5.0 in supported OS (#9724)
* fix(license): handle SPDX WITH exceptions as single license in category detection (#9380)
* refactor: add case-insensitive string set implementation (#9720)
* feat: include registry and repository in artifact ID calculation (#9689)
* feat(java): add support remote repositories from settings.xml files (#9708)
* fix(sbom): dont panic on SBOM format if scanned CycloneDX file has empty metadata (#9562)
* docs: update vulnerability reporting guidelines in SECURITY.md (#9395)
* docs: add info about `java-db` subdir (#9706)
* fix(report): correct field order in SARIF license results (#9712)
* test: improve golden file management in integration tests (#9699)
* ci: get base_sha using base.ref (#9704)
* refactor(misconf): mark AVDID fields as deprecated and use ID internally (#9576)
* fix(nodejs): fix npmjs parser.pkgNameFromPath() panic issue (#9688)
* fix: close all opened resources if an error occurs (#9665)
* refactor(misconf): type-safe parser results in generic scanner (#9685)
* feat(image): add RepoTags support for Docker archives (#9690)
* chore(deps): bump github.com/quic-go/quic-go from 0.52.0 to 0.54.1 (#9694)
* feat(misconf): Update Azure Container Schema (#9673)
* ci: use merge commit for apidiff to avoid false positives (#9622)
* feat(misconf): include map key in manifest snippet for diagnostics (#9681)
* refactor(misconf): add ManifestFromYAML for unified manifest parsing (#9680)
* test: update golden files for TestRepository* integration tests (#9684)
* refactor(cli): Update the cloud config command (#9676)
* fix(sbom): add `buildInfo` info as properties (#9683)
* feat: add ReportID field to scan reports (#9670)
* docs: add vulnerability database contribution guide (#9667)
* feat(cli): Add trivy cloud suppport (#9637)
* feat: add ArtifactID field to uniquely identify scan targets (#9663)
* fix(nodejs): use the default ID format to match licenses in pnpm packages. (#9661)
* feat(sbom): use SPDX license IDs list to validate SPDX IDs (#9569)
* fix: use context for analyzers (#9538)
* chore(deps): bump the docker group with 3 updates (#9545)
* chore(deps): bump the aws group with 6 updates (#9547)
* ci(helm): bump Trivy version to 0.67.2 for Trivy Helm Chart 0.19.1 (#9641)
* test(helm): bump up Yamale dependency for Helm chart-testing-action (#9653)
* fix: Trim the end-of-range suffix (#9618)
* test(k8s): use a specific bundle for k8s misconfig scan (#9633)
* fix: Use `fetch-level: 1` to check out trivy-repo in the release workflow (#9636)
* refactor: move the aws config (#9617)
* fix(license): don't normalize `unlicensed` licenses into `unlicense` (#9611)
* fix: using SrcVersion instead of Version for echo detector (#9552)
* feat(fs): change artifact type to repository when git info is detected (#9613)
* fix: add `buildInfo` for `BlobInfo` in `rpc` package (#9608)
* fix(vex): don't use reused BOM (#9604)
* ci: use pull_request_target for apidiff workflow to support fork PRs (#9605)
* fix: restore compatibility for google.protobuf.Value (#9559)
* ci: add API diff workflow (#9600)
* chore(deps): update to module-compatible docker-credential-gcr/v2 (#9591)
* docs: improve documentation for scanning raw IaC configurations (#9571)
* feat: allow ignoring findings by type in Rego (#9578)
* docs: bump pygments from 2.18.0 to 2.19.2 (#9596)
* refactor(misconf): add ID to scan.Rule (#9573)
* fix(java): update order for resolving package fields from multiple demManagement (#9575)
* chore(deps): bump the github-actions group across 1 directory with 9 updates (#9563)
* chore(deps): bump the common group across 1 directory with 7 updates (#9590)
* chore(deps): Switch to go-viper/mapstructure (#9579)
* chore: add context to the cache interface (#9565)
* ci(helm): bump Trivy version to 0.67.0 for Trivy Helm Chart 0.19.0 (#9554)
* fix: validate backport branch name (#9548)
</description>
<package>trivy</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,18 @@
<patchinfo incident="packagehub-50">
<issue tracker="bnc" id="1254437">VUL-0: CVE-2025-64460,CVE-2025-13372: python-Django: Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion</issue>
<issue tracker="bnc" id="1252926">VUL-0: CVE-2025-64459: python-Django,python-Django4: Potential SQL injection via `_connector` keyword argument in `QuerySet` and `Q` objects</issue>
<issue tracker="cve" id="2025-13372">cve#2025-13372 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-13372</issue>
<issue tracker="cve" id="2025-64460">cve#2025-64460 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-64460</issue>
<issue tracker="cve" id="2025-64459">cve#2025-64459 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-64459</issue>
<packager>mcalabkova</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for python-Django</summary>
<description>This update for python-Django fixes the following issues:
- CVE-2025-64459: Fixed a potential SQL injection via `_connector` keyword argument in `QuerySet` and `Q` objects (bsc#1252926)
- CVE-2025-13372,CVE-2025-64460: Fixed Denial of Service in 'django.core.serializers.xml_serializer.getInnerText()' (bsc#1254437)
</description>
<package>python-Django</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,13 @@
<patchinfo incident="packagehub-52">
<issue tracker="cve" id="2025-53881">cve#2025-53881 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-53881</issue>
<issue tracker="bnc" id="1246457">VUL-0: CVE-2025-53881: exim: SUSE-specific logrotate configuration allows escalation from mail user/group to root</issue>
<packager>bigironman</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for exim</summary>
<description>This update for exim fixes the following issues:
- CVE-2025-53881: Fixed a potential security issue with logfile rotation (bsc#1246457)
</description>
<package>exim</package>
</patchinfo>

2
trivy

Submodule trivy updated: 17acbb0d97...cdbf0f01cd