1
0

Compare commits

...

67 Commits

Author SHA256 Message Date
AutoGits PR Review Bot
7efb8b8dfc auto-created for dehydrated
This commit was autocreated by AutoGits PR Review Bot

referencing PRs:
 PR: pool/dehydrated!1
2026-01-15 09:35:10 +00:00
Marcus Meissner
27eb5ea6c4 Pull request for optional update for dehydrated
PR: pool/dehydrated#1
2026-01-15 09:33:23 +00:00
AutoGits PR Review Bot
be71c72197 Merging
PR: products/PackageHub!300
2026-01-11 17:00:09 +00:00
120471f77e Update patchinfo incident numbers [skip actions] 2026-01-09 16:23:02 +00:00
AutoGits PR Review Bot
db9c364b31 Merging
PR: products/PackageHub!307
2026-01-09 16:22:18 +00:00
3929c52614 Update patchinfo.20260107170113751929.93181000773252/_patchinfo
testing done, removed <seperate_build_arch/> again
2026-01-09 11:09:31 +01:00
d5e75ef24a Update patchinfo incident numbers [skip actions] 2026-01-09 09:06:13 +00:00
AutoGits PR Review Bot
46ad282010 Merging
PR: products/PackageHub!308
2026-01-09 09:05:33 +00:00
70aa830096 Update patchinfo incident numbers [skip actions] 2026-01-08 14:08:23 +00:00
AutoGits PR Review Bot
432b6015b9 Merging
PR: products/PackageHub!299
2026-01-08 14:08:02 +00:00
d0ef9928a7 Update patchinfo.20260107170113751929.93181000773252/_patchinfo
add back <seperate_build_arch/> for testing
2026-01-08 12:52:40 +01:00
bbd772aebb Update submodules from pool/chromium#24 and create patchinfo.20260108114750488113.93181000773252/_patchinfo 2026-01-08 12:48:24 +01:00
8fac4ab323 Update patchinfo.20260106101959221503.93181000773252/_patchinfo
removed <seperate_build_arch/>
2026-01-08 11:47:03 +01:00
12a7def9e2 Update patchinfo.20260107170113751929.93181000773252/_patchinfo
drop seperate_build_arch
2026-01-08 11:37:05 +01:00
24d02629f1 Update patchinfo incident numbers [skip actions] 2026-01-08 08:53:28 +00:00
AutoGits PR Review Bot
95edc64165 Merging
PR: products/PackageHub!290
2026-01-08 08:52:41 +00:00
85d2d64fc0 Update submodules from pool/ranger#1 and create patchinfo.20260107170113751929.93181000773252/_patchinfo 2026-01-07 18:01:31 +01:00
41d505f4ab Update patchinfo.20260106100749431638.93181000773252/_patchinfo
removed <seperate_build_arch/>
2026-01-07 09:51:40 +01:00
AutoGits PR Review Bot
cb67484fd4 auto-created for os-autoinst
This commit was autocreated by AutoGits PR Review Bot

referencing PRs:
 PR: pool/os-autoinst!7
2026-01-06 15:16:53 +00:00
7de4d17bb6 Update patchinfo.20251218142204589141.93181000773252/_patchinfo
updated os-autoinst section
2026-01-06 16:16:18 +01:00
AutoGits PR Review Bot
a24445cff8 Merging
PR: products/PackageHub!297
2026-01-06 15:02:46 +00:00
262eddbb2e Update submodules from pool/matio#1 and create patchinfo.20260106101959221503.93181000773252/_patchinfo 2026-01-06 11:20:25 +01:00
fc7baf3c8d Update submodules from pool/trivy#30 and create patchinfo.20260106100749431638.93181000773252/_patchinfo 2026-01-06 11:10:54 +01:00
9c3b6c187d Remove xen related packages 2026-01-05 11:40:17 +01:00
a47a0255a4 Update patchinfo incident numbers [skip actions] 2025-12-19 16:00:42 +00:00
AutoGits PR Review Bot
d08e2827bb Merging
PR: products/PackageHub!267
2025-12-19 16:00:18 +00:00
bc7de0e7cc Update patchinfo incident numbers [skip actions] 2025-12-19 15:30:01 +00:00
AutoGits PR Review Bot
8439743814 Merging
PR: products/PackageHub!281
2025-12-19 15:29:44 +00:00
AutoGits PR Review Bot
76091026db Merging
PR: products/PackageHub!289
2025-12-19 13:32:36 +00:00
AutoGits PR Review Bot
fc03ed1327 Merging
PR: products/PackageHub!277
2025-12-19 00:57:24 +00:00
b96a953188 Update patchinfo.20251218142204589141.93181000773252/_patchinfo
removed seperate_build_arch
2025-12-19 01:46:05 +01:00
6ae24600c5 Merge branch 'leap-16.0' into remove-rust 2025-12-18 21:00:23 +01:00
d1a0631733 Update submodules from pool/openQA#15, pool/os-autoinst#7, pool/openQA-devel-container#4 and create patchinfo.20251218142204589141.93181000773252/_patchinfo 2025-12-18 15:22:19 +01:00
AutoGits PR Review Bot
51ad92059e Merging
PR: products/PackageHub!282
2025-12-18 12:53:13 +00:00
3aae949b7a Update submodules from pool/chromium#22 and create patchinfo.20251218074156387460.187004354831441/_patchinfo 2025-12-18 08:42:10 +01:00
158832bfe1 Update patchinfo incident numbers [skip actions] 2025-12-18 00:06:41 +00:00
AutoGits PR Review Bot
a7ed1a773d Merging
PR: products/PackageHub!286
2025-12-18 00:05:41 +00:00
AutoGits PR Review Bot
6b53d9f452 Merging
PR: products/PackageHub!285
2025-12-17 16:32:59 +00:00
7cf3e1410d Merge branch 'leap-16.0' into fix-staging 2025-12-17 11:37:01 +01:00
AutoGits PR Review Bot
9d8b838644 Merging
PR: products/PackageHub!287
2025-12-17 10:30:13 +00:00
747469b4bf Add rfrohl to qam-openqa-review
As a fallback option: to be able to unblock updates during vacations periods.
2025-12-17 11:06:37 +01:00
3c973dcf63 Update submodules from pool/cheat#1 and create patchinfo.20251217091639760898.93181000773252/_patchinfo 2025-12-17 10:17:11 +01:00
80fe33645a Update patchinfo incident numbers [skip actions] 2025-12-16 00:49:57 +00:00
AutoGits PR Review Bot
2176ab50a4 Merging
PR: products/PackageHub!275
2025-12-16 00:49:29 +00:00
AutoGits PR Review Bot
158a277d59 Merging
PR: products/PackageHub!278
2025-12-16 00:48:59 +00:00
fb57ec8f31 merge upstream 2025-12-15 14:02:28 +01:00
Marcus Meissner
bbb50fccd1 this exclusive build configgs also should be in stagings... 2025-12-15 08:16:14 +00:00
89bd7827cb Update patchinfo incident numbers [skip actions] 2025-12-15 08:14:54 +00:00
AutoGits PR Review Bot
cb8920ffd6 Merging
PR: products/PackageHub!284
2025-12-15 08:14:12 +00:00
46f285f4b7 Update submodules from pool/labwc#1 and create patchinfo.20251214181248399975.93181000773252/_patchinfo 2025-12-14 19:13:19 +01:00
d38e304ad2 Update patchinfo incident numbers [skip actions] 2025-12-12 15:24:06 +00:00
AutoGits PR Review Bot
6411d5ea23 Merging
PR: products/PackageHub!280
2025-12-12 15:23:45 +00:00
c3d432dd34 Update patchinfo incident numbers [skip actions] 2025-12-12 13:11:27 +00:00
AutoGits PR Review Bot
d433f344c3 Merging
PR: products/PackageHub!250
2025-12-12 13:10:49 +00:00
ee207a2ab3 Update patchinfo.20251211092111744764.93181000773252/_patchinfo
drop  `<seperate_build_arch/>`
2025-12-12 13:46:54 +01:00
792ee49a40 Exclude rmt-server related packages from publishing (bsc#1253965) 2025-12-11 15:34:04 +01:00
Marcus Meissner
cd1bed3528 rust and cargo are shipped from SLES 2025-12-11 13:11:19 +00:00
7d490f401a Update submodules from pool/chromium#19 and create patchinfo.20251211092111744764.93181000773252/_patchinfo 2025-12-11 10:21:37 +01:00
AutoGits PR Review Bot
0673a0497c auto-created for rawtherapee
This commit was autocreated by AutoGits PR Review Bot

referencing PRs:
 PR: pool/rawtherapee!1
2025-12-10 17:00:12 +00:00
Marcus Meissner
9423c5c9b7 Pull request for optional update for rawtherapee
PR: pool/rawtherapee!1
2025-12-10 16:58:56 +00:00
927e99a69e Update patchinfo incident numbers [skip actions] 2025-12-10 16:27:36 +00:00
AutoGits PR Review Bot
7114ff5a64 Merging
PR: products/PackageHub!273
2025-12-10 16:27:17 +00:00
5996407142 Update submodules from pool/cmake-extras#1 and create patchinfo.20251210102155991569.93181000773252/_patchinfo 2025-12-10 11:23:05 +01:00
55f7b884a6 Update submodules from pool/virtme#4 and create patchinfo.20251210101443200408.93181000773252/_patchinfo 2025-12-10 11:14:52 +01:00
4022efbf5d Update patchinfo.20251208143300643166.187004354831441/_patchinfo
remove seperate build arch
2025-12-10 09:36:04 +01:00
a85d786d1d Update submodules from pool/icinga-php-thirdparty#1, pool/icinga-php-library#1, pool/icingaweb2#1 and create patchinfo.20251208143300643166.187004354831441/_patchinfo 2025-12-08 15:33:15 +01:00
142516cf54 Update submodules from pool/hauler#2 and create patchinfo.20251201094954024941.93181000773252/_patchinfo 2025-12-01 10:51:48 +01:00
37 changed files with 770 additions and 16 deletions

8
.gitmodules vendored
View File

@@ -290,6 +290,10 @@
path = PrusaSlicer
url = ../../pool/PrusaSlicer
branch = leap-16.0
[submodule "dehydrated"]
path = dehydrated
url = ../../pool/dehydrated
branch = leap-16.0
[submodule "QR-Code-generator"]
path = QR-Code-generator
url = ../../pool/QR-Code-generator
@@ -17350,6 +17354,10 @@
path = rasqal
url = ../../pool/rasqal
branch = leap-16.0
[submodule "rawtherapee"]
path = rawtherapee
url = ../../pool/rawtherapee
branch = leap-16.0
[submodule "raw-thumbnailer"]
path = raw-thumbnailer
url = ../../pool/raw-thumbnailer

View File

@@ -1,3 +1,10 @@
-------------------------------------------------------------------
Mon Jan 5 10:38:32 UTC 2026 - Wolfgang Engel <wolfgang.engel@suse.com>
- Backports.productcompose:
+ add to backports_unneeded, remove xen related packages (bsc#1253226)
xen-tools-xendomains-wait-disk
-------------------------------------------------------------------
Fri Oct 10 07:19:41 UTC 2025 - Wolfgang Engel <wolfgang.engel@suse.com>

View File

@@ -281,6 +281,7 @@ packagesets:
- xen-doc-html
- xen-tools
- xen-tools-domU
- xen-tools-xendomains-wait-disk
- yum-utils
# TODO: unneeded Leap package per architecture
@@ -701,6 +702,9 @@ packagesets:
- cargo-packaging
- cargo1.87
- cargo1.88
- cargo1.89
- cargo1.90
- cargo1.91
- catatonit
- cblas-devel
- cblas-devel-static
@@ -6795,6 +6799,9 @@ packagesets:
- rhino-engine
- rhino-javadoc
- rhino-runtime
- rmt-server
- rmt-server-config
- rmt-server-pubcloud
- rollback-helper
- rootlesskit
- rp-pppoe
@@ -6851,6 +6858,9 @@ packagesets:
- rust-keylime
- rust1.87
- rust1.88
- rust1.89
- rust1.90
- rust1.91
- samba
- samba-ad-dc
- samba-ad-dc-libs

View File

@@ -168,7 +168,7 @@ Macros:
# Leap specific package list, the same list with excludebuild must add to Backports project
# Most of package should be built in Backports
%if "%_project" == "openSUSE:Backports:SLE-16.0"
%if 0%{?_is_in_project}
# we build ffado:ffado-mixer for openSUSE, the main one is built in SLFO
BuildFlags: excludebuild:ffado
# build gpgme:qt flavor for qt5 support

2
cheat

Submodule cheat updated: 27656594fe...e8f7ed9227

1
dehydrated Submodule

Submodule dehydrated added at 67698c18b1

2
hauler

Submodule hauler updated: 9084f004c1...4061841edd

2
labwc

Submodule labwc updated: 3ff4d66043...54ed9a7fa2

2
matio

Submodule matio updated: a301162ce9...cab79b5274

2
openQA

Submodule openQA updated: e091086774...bc2c977db5

View File

@@ -0,0 +1,209 @@
<patchinfo incident="packagehub-54">
<issue tracker="bnc" id="1251651">VUL-0: CVE-2025-58190: hauler: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially crafted input</issue>
<issue tracker="cve" id="2025-22872">cve#2025-22872 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-22872</issue>
<issue tracker="cve" id="2025-58058">cve#2025-58058 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-58058</issue>
<issue tracker="cve" id="2024-45338">cve#2024-45338 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2024-45338</issue>
<issue tracker="bnc" id="1241184">VUL-0: CVE-2024-0406: hauler: mholt/archiver: access to restricted files or directories when unpacking specially crafted tar file</issue>
<issue tracker="bnc" id="1235332">VUL-0: CVE-2024-45338: hauler: golang.org/x/net/html: denial of service due to non-linear parsing of case-insensitive content</issue>
<issue tracker="cve" id="2025-11579">cve#2025-11579 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-11579</issue>
<issue tracker="cve" id="2024-0406">cve#2024-0406 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2024-0406</issue>
<issue tracker="cve" id="2025-47911">cve#2025-47911 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-47911</issue>
<issue tracker="cve" id="2025-46569">cve#2025-46569 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-46569</issue>
<issue tracker="bnc" id="1246722">VUL-0: CVE-2025-46569: hauler: github.com/open-policy-agent/opa: HTTP request path can be crafted to inject Rego code into a constructed query when a virtual document is requested through the Data API</issue>
<issue tracker="bnc" id="1248937">VUL-0: CVE-2025-58058: hauler: github.com/ulikunitz/xz: github.com/ulikunitz/xz leaks memory</issue>
<issue tracker="bnc" id="1241804">VUL-0: CVE-2025-22872: hauler: golang.org/x/net/html: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction</issue>
<issue tracker="bnc" id="1251516">VUL-0: CVE-2025-47911: hauler: golang.org/x/net/html: various algorithms with quadratic complexity when parsing HTML documents</issue>
<issue tracker="cve" id="2025-58190">cve#2025-58190 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-58190</issue>
<issue tracker="bnc" id="1251891">VUL-0: CVE-2025-11579: hauler: github.com/nwaples/rardecode: failure to restrict the dictionary size when processing RAR files allows for excessive memory consumpti</issue>
<packager>dirkmueller</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for hauler</summary>
<description>This update for hauler fixes the following issues:
- Update to version 1.3.1 (bsc#1251516, CVE-2025-47911,
bsc#1251891, CVE-2025-11579, bsc#1251651, CVE-2025-58190,
bsc#1248937, CVE-2025-58058):
* bump github.com/containerd/containerd (#474)
* another fix to tests for new tests (#472)
* fixed typo in testdata (#471)
* fixed/cleaned new tests (#470)
* trying a new way for hauler testing (#467)
* update for cosign v3 verify (#469)
* added digests view to info (#465)
* bump github.com/nwaples/rardecode/v2 from 2.1.1 to 2.2.0 in the go_modules group across 1 directory (#457)
* update oras-go to v1.2.7 for security patches (#464)
* update cosign to v3.0.2+hauler.1 (#463)
* fixed homebrew directory deprecation (#462)
* add registry logout command (#460)
- Update to version 1.3.0:
* bump the go_modules group across 1 directory with 2 updates (#455)
* upgraded versions/dependencies/deprecations (#454)
* allow loading of docker tarballs (#452)
* bump the go_modules group across 1 directory with 2 updates (#449)
- update to 1.2.5 (bsc#1246722, CVE-2025-46569):
* Bump github.com/open-policy-agent/opa from 1.1.0 to 1.4.0 in
the go_modules group across 1 directory (CVE-2025-46569)
* deprecate auth from hauler store copy
* Bump github.com/cloudflare/circl from 1.3.7 to 1.6.1 in the
go_modules group across 1 directory
* Bump github.com/go-viper/mapstructure/v2 from 2.2.1 to 2.3.0
in the go_modules group across 1 directory
* upgraded go and dependencies versions
- Update to version 1.2.5:
* upgraded go and dependencies versions (#444)
* Bump github.com/go-viper/mapstructure/v2 (#442)
* bump github.com/cloudflare/circl (#441)
* deprecate auth from hauler store copy (#440)
* Bump github.com/open-policy-agent/opa (#438)
- update to 1.2.4 (CVE-2025-22872, bsc#1241804):
* Bump golang.org/x/net from 0.37.0 to 0.38.0 in the go_modules
group across 1 directory
* minor tests updates
- Update to version 1.2.3:
* formatting and flag text updates
* add keyless signature verification (#434)
* bump helm.sh/helm/v3 in the go_modules group across 1 directory (#430)
* add --only flag to hauler store copy (for images) (#429)
* fix tlog verification error/warning output (#428)
- Update to version 1.2.2 (bsc#1241184, CVE-2024-0406):
* cleanup new tlog flag typos and add shorthand (#426)
* default public transparency log verification to false to be airgap friendly but allow override (#425)
* bump github.com/golang-jwt/jwt/v4 (#423)
* bump the go_modules group across 1 directory with 2 updates (#422)
* bump github.com/go-jose/go-jose/v3 (#417)
* bump github.com/go-jose/go-jose/v4 (#415)
* clear default manifest name if product flag used with sync (#412)
* updates for v1.2.0 (#408)
* fixed remote code (#407)
* added remote file fetch to load (#406)
* added remote and multiple file fetch to sync (#405)
* updated save flag and related logs (#404)
* updated load flag and related logs [breaking change] (#403)
* updated sync flag and related logs [breaking change] (#402)
* upgraded api update to v1/updated dependencies (#400)
* fixed consts for oci declarations (#398)
* fix for correctly grabbing platform post cosign 2.4 updates (#393)
* use cosign v2.4.1+carbide.2 to address containerd annotation in index.json (#390)
* Bump the go_modules group across 1 directory with 2 updates (#385)
* replace mholt/archiver with mholt/archives (#384)
* forked cosign bump to 2.4.1 and use as a library vs embedded binary (#383)
* cleaned up registry and improved logging (#378)
* Bump golang.org/x/crypto in the go_modules group across 1 directory (#377)
- bump net/html dependencies (bsc#1235332, CVE-2024-45338)
- Update to version 1.1.1:
* fixed cli desc for store env var (#374)
* updated versions for go/k8s/helm (#373)
* updated version flag to internal/flags (#369)
* renamed incorrectly named consts (#371)
* added store env var (#370)
* adding ignore errors and retries for continue on error/fail on error (#368)
* updated/fixed hauler directory (#354)
* standardize consts (#353)
* removed cachedir code (#355)
* removed k3s code (#352)
* updated dependencies for go, helm, and k8s (#351)
* [feature] build with boring crypto where available (#344)
* updated workflow to goreleaser builds (#341)
* added timeout to goreleaser workflow (#340)
* trying new workflow build processes (#337)
* improved workflow performance (#336)
* have extract use proper ref (#335)
* yet another workflow goreleaser fix (#334)
* even more workflow fixes (#333)
* added more fixes to github workflow (#332)
* fixed typo in hauler store save (#331)
* updates to fix build processes (#330)
* added integration tests for non hauler tarballs (#325)
* bump: golang &gt;= 1.23.1 (#328)
* add platform flag to store save (#329)
* Update feature_request.md
* updated/standardize command descriptions (#313)
* use new annotation for 'store save' manifest.json (#324)
* enable docker load for hauler tarballs (#320)
* bump to cosign v2.2.3-carbide.3 for new annotation (#322)
* continue on error when adding images to store (#317)
* Update README.md (#318)
* fixed completion commands (#312)
* github.com/rancherfederal/hauler =&gt; hauler.dev/go/hauler (#311)
* pages: enable go install hauler.dev/go/hauler (#310)
* Create CNAME
* pages: initial workflow (#309)
* testing and linting updates (#305)
* feat-273: TLS Flags (#303)
* added list-repos flag (#298)
* fixed hauler login typo (#299)
* updated cobra function for shell completion (#304)
* updated install.sh to remove github api (#293)
* fix image ref keys getting squashed when containing sigs/atts (#291)
* fix missing versin info in release build (#283)
* bump github.com/docker/docker in the go_modules group across 1 directory (#281)
* updated install script (`install.sh`) (#280)
* fix digest images being lost on load of hauls (Signed). (#259)
* feat: add readonly flag (#277)
* fixed makefile for goreleaser v2 changes (#278)
* updated goreleaser versioning defaults (#279)
* update feature_request.md (#274)
* updated old references
* updated actions workflow user
* added dockerhub to github actions workflow
* removed helm chart
* added debug container and workflow
* updated products flag description
* updated chart for release
* fixed workflow errors/warnings
* fixed permissions on testdata
* updated chart versions (will need to update again)
* last bit of fixes to workflow
* updated unit test workflow
* updated goreleaser deprecations
* added helm chart release job
* updated github template names
* updated imports (and go fmt)
* formatted gitignore to match dockerignore
* formatted all code (go fmt)
* updated chart tests for new features
* Adding the timeout flag for fileserver command
* Configure chart commands to use helm clients for OCI and private registry support
* Added some documentation text to sync command
* Bump golang.org/x/net from 0.17.0 to 0.23.0
* fix for dup digest smashing in cosign
* removed vagrant scripts
* last bit of updates and formatting of chart
* updated hauler testdata
* adding functionality and cleaning up
* added initial helm chart
* removed tag in release workflow
* updated/fixed image ref in release workflow
* updated/fixed platforms in release workflow
* updated/cleaned github actions (#222)
* Make Product Registry configurable (#194)
* updated fileserver directory name (#219)
* fix logging for files
* add extra info for the tempdir override flag
* tempdir override flag for load
* deprecate the cache flag instead of remove
* switch to using bci-golang as builder image
* fix: ensure /tmp for hauler store load
* added the copy back for now
* remove copy at the image sync not needed with cosign update
* removed misleading cache flag
* better logging when adding to store
* update to v2.2.3 of our cosign fork
* add: dockerignore
* add: Dockerfile
* Bump google.golang.org/protobuf from 1.31.0 to 1.33.0
* Bump github.com/docker/docker
* updated and added new logos
* updated github files
</description>
<package>hauler</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,63 @@
<patchinfo incident="packagehub-61">
<packager>bigironman</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for icinga-php-thirdparty, icinga-php-library, icingaweb2</summary>
<description>This update for icinga-php-thirdparty, icinga-php-library, icingaweb2 fixes the following issues:
Changes in icinga-php-thirdparty:
- Update to 0.13.1
- No changelog from upstream.
- Update to 0.12.1
- No changelog from upstream.
Changes in icinga-php-library:
- Update to 1.17.0
- No changelog from upstream.
Changes in icingaweb2:
- Update to 2.12.6
- Search box shows many magnifying glasses for some community themes #5395
- Authentication hooks are not called with external backends #5415
- Improve Minimal layout #5386
- Update to 2.12.5
* PHP 8.4 Support
We're again a little behind schedule, but now we support PHP 8.4!
This means that installations on Ubuntu 25.04 and Fedora 42+ can
now install Icinga Web without worrying about PHP related
incompatibilities. Icinga packages will be available in the
next few days.
* Good Things Take Time
There's only a single (notable) recent issue that is fixed
with this release. All the others are a bit older.
- External URLs set up as dashlets are not embedded the same
as navigation items #5346
* But the team sat together a few weeks ago and fixed a bug here
and there. And of course, also in Icinga Web!
- Users who are not allowed to change the theme, cannot change
the theme mode either #5385
- Improved compatibility with several SSO authentication
providers #5000, #5227
- Filtering for older-than events with relative time does not
work #5263
- Empty values are NULL in CSV exports #5350
* Breaking, Somewhat
This is mainly for developers.
With the support of PHP 8.4, we introduced a new environment
variable, ICINGAWEB_ENVIRONMENT. Unless set to dev, Icinga Web
will not show nor log deprecation notices anymore.
</description>
<package>icinga-php-thirdparty</package>
<package>icinga-php-library</package>
<package>icingaweb2</package>
</patchinfo>

View File

@@ -0,0 +1,18 @@
<patchinfo incident="packagehub-53">
<packager>michals</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for virtme</summary>
<description>This update for virtme fixes the following issues:
- Update to 1.40:
* No significant change, this is just a very small hotfix release
to solve a packaging problem introduced by a conflict with the
new vng-mcp tool.
* While at it, there're also some small improved hints in the MCP
server, so that AI agents can better understand how to build
the kernel using vng --build.
</description>
<package>virtme</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,20 @@
<patchinfo incident="packagehub-57">
<issue tracker="bnc" id="1254531">cmake-extras: Could not locate qmlplugindump</issue>
<issue tracker="bnc" id="1239788">cmake4: build failure tracker bug.</issue>
<packager>hillwood</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for cmake-extras</summary>
<description>This update for cmake-extras fixes the following issues:
- Support both qmlplugindump-qt5 and qmlplugindump-qt6 (boo#1254531)
- Fix filename and path of qmlplugindump-qt5 for openSUSE
- Update to 1.9
* add support for CMake 4.0
- Update to 1.8
* GMock: wire dependencies between GMock step and library files
* QmlPlugins: Crude support for qt6
</description>
<package>cmake-extras</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,11 @@
<patchinfo incident="packagehub-58">
<packager>pgajdos</packager>
<rating>moderate</rating>
<category>optional</category>
<summary>Optional update for rawtherapee</summary>
<description>This update for rawtherapee fixes the following issues:
Ship rawtherapee image editor.
</description>
<package>rawtherapee</package>
</patchinfo>

View File

@@ -0,0 +1,17 @@
<patchinfo incident="packagehub-55">
<issue tracker="cve" id="2025-14372">cve#2025-14372 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-14372</issue>
<issue tracker="bnc" id="1254776">VUL-0: chromium: release 143.0.7499.109</issue>
<issue tracker="cve" id="2025-14373">cve#2025-14373 not resolved: 404 Client Error: Not Found for url: https://bugzilla.suse.com/api2/issues/?references__name=CVE-2025-14373</issue>
<packager>AndreasStieger</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for chromium</summary>
<description>This update for chromium fixes the following issues:
- Chromium 143.0.7499.109 (boo#1254776):
* CVE-2025-14372: Use after free in Password Manager
* CVE-2025-14373: Inappropriate implementation in Toolbar
* third issue with an exploit is known to exist in the wild
</description>
<package>chromium</package>
</patchinfo>

View File

@@ -0,0 +1,15 @@
<patchinfo incident="packagehub-56">
<issue tracker="bnc" id="1254386">labwc crashes when turning display off with wlr-randr (fixed in upstream and Factory)</issue>
<packager>lucsansag</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for labwc</summary>
<description>This update for labwc fixes the following issues:
Changes in labwc:
- Fixed layershell unmap segfault when no outputs left (boo#1254386)
</description>
<package>labwc</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,65 @@
<patchinfo incident="packagehub-59">
<issue tracker="cve" id="2025-21614">CVE-2025-21614 go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies</issue>
<issue tracker="bnc" id="1247629">VUL-0: CVE-2025-21613: cheat: github.com/go-git/go-git/v5: argument injection via the URL field</issue>
<issue tracker="cve" id="2025-58181">VUL-0: CVE-2025-58181: TRACKERBUG: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
<issue tracker="cve" id="2025-21613">VUL-0: CVE-2025-21613: TRACKERBUG: github.com/go-git/go-git/v5: argument injection via the URL field</issue>
<issue tracker="cve" id="2025-47913">VUL-0: CVE-2025-47913: TRACKERBUG: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or</issue>
<issue tracker="bnc" id="1253922">VUL-0: CVE-2025-58181: cheat: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
<issue tracker="cve" id="2025-47914">VUL-0: CVE-2025-47914: TRACKERBUG: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue>
<issue tracker="cve" id="2025-22870">VUL-0: CVE-2025-22870: TRACKERBUG: golang.org/net/http, golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue>
<issue tracker="cve" id="2023-48795">VUL-0: CVE-2023-48795: openssh: prefix truncation breaking ssh channel integrity aka Terrapin Attack</issue>
<issue tracker="bnc" id="1254051">VUL-0: CVE-2025-47914: cheat: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue>
<issue tracker="bnc" id="1253593">VUL-0: CVE-2025-47913: cheat: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or signing request</issue>
<issue tracker="cve" id="2025-22869">VUL-0: CVE-2025-22869: TRACKERBUG: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh</issue>
<packager>witekbedyk</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for cheat</summary>
<description>This update for cheat fixes the following issues:
- Security:
* CVE-2025-47913: Fix client process termination (bsc#1253593)
* CVE-2025-58181: Fix potential unbounded memory consumption (bsc#1253922)
* CVE-2025-47914: Fix panic due to an out of bounds read (bsc#1254051)
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.45.0
* Replace golang.org/x/net=golang.org/x/net@v0.47.0
* Replace golang.org/x/sys=golang.org/x/sys@v0.38.0
- Packaging improvements:
* Drop Requires: golang-packaging. The recommended Go toolchain
dependency expression is BuildRequires: golang(API) &gt;= 1.x or
optionally the metapackage BuildRequires: go
* Use BuildRequires: golang(API) &gt;= 1.19 matching go.mod
* Build PIE with pattern that may become recommended procedure:
%%ifnarch ppc64 GOFLAGS="-buildmode=pie" %%endif go build
A go toolchain buildmode default config would be preferable
but none exist at this time.
* Drop mod=vendor, go1.14+ will detect vendor dir and auto-enable
* Remove go build -o output binary location and name. Default
binary has the same name as package of func main() and is
placed in the top level of the build directory.
* Add basic %check to execute binary --help
- Packaging improvements:
* Service go_modules replace dependencies with CVEs
* Replace github.com/cloudflare/circl=github.com/cloudflare/circl@v1.6.1
Fix GO-2025-3754 GHSA-2x5j-vhc8-9cwm
* Replace golang.org/x/net=golang.org/x/net@v0.36.0
Fixes GO-2025-3503 CVE-2025-22870
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.35.0
Fixes GO-2023-2402 CVE-2023-48795 GHSA-45x7-px36-x8w8
Fixes GO-2025-3487 CVE-2025-22869
* Replace github.com/go-git/go-git/v5=github.com/go-git/go-git/v5@v5.13.0
Fixes GO-2025-3367 CVE-2025-21614 GHSA-r9px-m959-cxf4
Fixes GO-2025-3368 CVE-2025-21613 GHSA-v725-9546-7q7m
* Service tar_scm set mode manual from disabled
* Service tar_scm create archive from git so we can exclude
vendor directory upstream committed to git. Committed vendor
directory contents have build issues even after go mod tidy.
* Service tar_scm exclude dir vendor
* Service set_version set mode manual from disabled
* Service set_version remove param basename not needed
</description>
<package>cheat</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,21 @@
<patchinfo incident="packagehub-60">
<issue tracker="cve" id="2025-14766">VUL-0: chromium: release 143.0.7499.146</issue>
<issue tracker="cve" id="2025-14174">Google Chrome: chromium: Out of bounds memory access via crafted HTML page</issue>
<issue tracker="bnc" id="1255115">VUL-0: chromium: release 143.0.7499.146</issue>
<issue tracker="cve" id="2025-14765">VUL-0: chromium: release 143.0.7499.146</issue>
<packager>oertel</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for chromium</summary>
<description>This update for chromium fixes the following issues:
Changes in chromium:
Chromium 143.0.7499.146 (boo#1255115):
* CVE-2025-14765: Use after free in WebGPU
* CVE-2025-14766: Out of bounds read and write in V8
* CVE-2025-14174: Out of bounds memory access in ANGLE
</description>
<package>chromium</package>
</patchinfo>

View File

@@ -0,0 +1,123 @@
<patchinfo incident="packagehub-62">
<packager>os-autoinst-obs-workflow</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for openQA, os-autoinst, openQA-devel-container</summary>
<description>This update for openQA, os-autoinst, openQA-devel-container fixes the following issues:
Changes in openQA:
Thu Dec 18 03:54:10 UTC 2025 - okurz@suse.com
- Update to version 5.1766014013.377e64fe:
* feat(Needle::Save): Adapt to new error handling
* feat(OpenQA::Git): Make error handling more flexible with exceptions
- Update to version 5.1765887110.8fc02990:
* Avoid partial deletion of a screenshot if Minion job is aborted
* Add `SignalBlocker` to delay signal handling during critical sections
- Update to version 5.1765805960.2112d43d:
* fix(codecov): Fix wrong casing for 'fully_covered' entries
- Update to version 5.1765535865.b566a24c:
* fix(codecov): Be strict about coverage thresholds
* Show jobs that have been cloned when `t` parameter is used on overview
- Update to version 5.1765469360.5c0525b5:
* worker: Add coverage for OVS DBus checks
* Fix overview when filtering by test and module result at the same time
* Return signal as part of run_cmd result
* Add scanner for untracked screenshots
* KTAP: Properly hide details of a skipped subtest
* docs: Restory logic of the sentence about NFT vs firewalld
* docs: Clarify DHCP/RA availability on MM networks
* feat: Allow to configure key+secret with env variables
- Update to version 5.1765286149.3debb8ea:
* KTAP: Don't increment parsed_lines_count in "SKIP" lines
* KTAP: Define unparsed_lines and parsed_lines_count
- Update to version 5.1765217707.d6e697fd:
* Test commenting on overview page together with TODO filter
* Fix job IDs that are considered for mass-commenting on overview page
- Update to version 5.1765009312.be30f6e0:
* README: Remove left-over empty badge reference
Changes in os-autoinst:
- Update to version 5.1767623406.688dd0e:
* os-autoinst-generate-needle-preview: Embed PNG
* Tweak curl call not to hang
* Fix opencv dependency due to upstream changes
* Restore package builds on older openSUSE versions
* Remove `ShellCheck` from devel dependencies on s390x
- Update to version 5.1766037062.44c7d2a:
* Tweak curl call not to hang
* Fix opencv dependency due to upstream changes
* Restore package builds on older openSUSE versions
* Remove `ShellCheck` from devel dependencies on s390x
* Remove obsolete 'bin/' folder
- Update to version 5.1765976654.0026f92:
* Fix opencv dependency due to upstream changes
* Restore package builds on older openSUSE versions
* Remove `ShellCheck` from devel dependencies on s390x
* Remove obsolete 'bin/' folder
* Improve documentation strings for get/check_var
- Update to version 5.1765808557.b89e9b4:
* Restore package builds on older openSUSE versions
* Remove `ShellCheck` from devel dependencies on s390x
* Remove obsolete 'bin/' folder
* Simplify the code to increment the counter
* audio: Allow for multiple audio recordings per test
- Update to version 5.1765804109.1e7c99a:
* Remove `ShellCheck` from devel dependencies on s390x
* Remove obsolete 'bin/' folder
* Simplify the code to increment the counter
* audio: Allow for multiple audio recordings per test
* Improve documentation strings for get/check_var
- Update to version 5.1765533145.a82864c:
* Remove obsolete 'bin/' folder
* Simplify the code to increment the counter
* audio: Allow for multiple audio recordings per test
* Improve documentation strings for get/check_var
* Add port forwarding example for NICTYPE_USER_OPTIONS
- Update to version 5.1765450253.f16e6ac:
* Simplify the code to increment the counter
* audio: Allow for multiple audio recordings per test
* Improve documentation strings for get/check_var
* Add port forwarding example for NICTYPE_USER_OPTIONS
* Fix regression from abcaa66b by disabling virtio-keyboard by default
* distribution: Add "disable_key_repeat"
* Use 'virtio-keyboard' by default to allow fixing key repetition errors
- Update to version 5.1765311639.7e3a762:
* Simplify the code to increment the counter
* audio: Allow for multiple audio recordings per test
* Add port forwarding example for NICTYPE_USER_OPTIONS
* Fix regression from abcaa66b by disabling virtio-keyboard by default
* Add IPv6 support for multi machine tests
Changes in openQA-devel-container:
- Update to version 5.1766014013.377e64fe9:
* Update to latest openQA version
</description>
<package>openQA</package>
<package>openQA:openQA-devel-test</package>
<package>openQA:openQA-test</package>
<package>openQA:openQA-worker-test</package>
<package>openQA:openQA-client-test</package>
<package>os-autoinst</package>
<package>os-autoinst:os-autoinst-test</package>
<package>os-autoinst:os-autoinst-devel-test</package>
<package>os-autoinst:os-autoinst-openvswitch-test</package>
<package>openQA-devel-container</package>
</patchinfo>

View File

@@ -0,0 +1,24 @@
<patchinfo incident="packagehub-63">
<issue tracker="cve" id="2025-58181"/>
<issue tracker="cve" id="2025-47913"/>
<issue tracker="cve" id="2025-58190"/>
<issue tracker="cve" id="2025-47914"/>
<issue tracker="cve" id="2025-47911"/>
<issue tracker="bnc" id="1253512">VUL-0: CVE-2025-47913: trivy: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or signing request</issue>
<issue tracker="bnc" id="1253977">VUL-0: CVE-2025-47914: trivy: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue>
<issue tracker="bnc" id="1251547">VUL-0: CVE-2025-58190: trivy: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially crafted input</issue>
<issue tracker="bnc" id="1251363">VUL-0: CVE-2025-47911: trivy: golang.org/x/net/html: various algorithms with quadratic complexity when parsing HTML documents</issue>
<issue tracker="bnc" id="1253786">VUL-0: CVE-2025-58181: trivy: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
<packager>dirkmueller</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for trivy</summary>
<description>This update for trivy fixes the following issues:
- Update to version 0.68.2:
* release: v0.68.2 [release/v0.68] (#9950)
* fix(deps): bump alpine from `3.22.1` to `3.23.0` [backport: release/v0.68] (#9949)
* ci: enable `check-latest` for `setup-go` [backport: release/v0.68] (#9946)
</description>
<package>trivy</package>
</patchinfo>

View File

@@ -0,0 +1,33 @@
<patchinfo>
<issue tracker="bnc" id="1239678">VUL-0: CVE-2025-2337: matio: heap buffer overflow in function Mat_VarPrint of file src/mat.c</issue>
<issue tracker="cve" id="2025-2337">VUL-0: CVE-2025-2337: matio: heap buffer overflow in function Mat_VarPrint of file src/mat.c</issue>
<issue tracker="cve" id="2025-2338">VUL-0: CVE-2025-2338: matio: heap buffer overflow in function strdup_vprintf of file src/io.c</issue>
<issue tracker="bnc" id="1239677">VUL-0: CVE-2025-2338: matio: heap buffer overflow in function strdup_vprintf of file src/io.c</issue>
<packager>AndreasStieger</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for matio</summary>
<description>This update for matio fixes the following issues:
- update to version 1.5.29:
* Fix printing rank-1-variable in Mat_VarPrint
* Fix array index out of bounds in Mat_VarPrint when printing
UTF-8 character data (boo#1239678, CVE-2025-2337)
* Fix heap-based buffer overflow in strdup_vprintf
(boo#1239677, CVE-2025-2338)
* Changed Mat_VarPrint to print all values of rank-2-variable
* Several other fixes, for example for access violations in
Mat_VarPrint
- Update to version 1.5.28:
* Fixed bug writing MAT_T_INT8/MAT_T_UINT8 encoded character
array to compressed v5 MAT file (regression of v1.5.12).
* Fixed bug reading all-zero sparse array of v4 MAT file
(regression of v1.5.18).
* Updated C99 snprintf.c.
* CMake: Enabled testing.
* Several other fixes, for example for access violations in
Mat_VarPrint.
</description>
<package>matio</package>
</patchinfo>

View File

@@ -0,0 +1,76 @@
<patchinfo incident="packagehub-65">
<packager>sbradnick</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for ranger</summary>
<description>This update for ranger fixes the following issues:
- Update to version 1.9.4+git20250910.3f7a3546:
* img_display: Avoid unicode escape sequences for Ueberzug input
* man: fix documentation of which license ranger uses exactly
* rifle: fixed+clarified usage string
- Update to version 1.9.4+git20250604.7e38143:
* fixed bug with command info staying
* Revert "fixed open_with bugginess"
* fixed open_with bugginess
* commands: Reword comment for brevity and accuracy
* GHActions: Pass config_files rather than boolean to flake8
* commands: Disable invalid-name and too-many-lines pylints
* Pylint: Disable invalid-name and too-many-lines for commands.py
* add :unnarrow to disable :narrow mode
* rifle: Update version
- Update to version 1.9.4+git20250305.7ad50fa:
* 7-zip now has an official Linux version (7zz)
* add: support for tilde in bookmarks
* img_display: address PR feedback
* docs: kitty image previews are supported in other terminals now
* img_display: auto-detect support for kitty image previews
* rifle(terminals): support auto-detecting ghostty terminal emulator
* Modified order of expantions in peview_script
* Add GNOME papers to document viewers
* Added ability to use environmental variables in preview_script option
* doc: Regenerate man pages to have the proper version
* Makefile: Update version Grep since adding logo to README
* ranger/__init__: Caught another unbumped version
* mime.types: Add .nim extension for text/plain
* Fixed mistooks of nim scripts as a video aNIMations in rifle.conf
* GHActions: Pypy don't run old Flake8/Pylint
* GHActions: Use Pypy 3.10
* actions: Use keywords for rifle.execute
* runner: Allow action as positional argument
* ui: Refresh window in initialize
* ui: endwin already sets cursor to normal visibility
* requirements: Add setuptools
* img_display: Silence no-member false positive
* core/main: Drop unused variable prefix_length
* core,ext: Avoid return in finally shadowing return value
* test_py2_compat: Prevent use of yield from
* core,ext: Reduce positional arguments where possible
* pager,history: Replace branch with min/max builtins
* Pylint: Update custom checker for compatibility with 3.3.1
* GHActions: Bump action versions
* README: Use forge-agnostic URL
* README: Capitalize ranger
* README: Bump version
* README: Replace Travis with GHActions badge
* README: Center header
* make logo in readme wider
* move the ranger logo to the very top
* Add option confirm_on_trash
* Fix typos
* Add IINA to rifle.conf
* browsercolumn: ANSI escape codes support
* #1182: Fix signals for OS X
- Update to version 1.9.3+git20240801.bd9b37f:
* properly decode file:// urls given to ranger as argument (fixes #2900)
* fix #2873 WM_NAME now shows "not accessible" in non-existent directories
* Fixed inconsistency in ranger documentation where it was stated that commanding 'linemode humanreadablesizemtime' changed the linemode to display human readable modification time and file size, but the correct command for this is 'linemode sizehumanreadablemtime'
* README: fix link formatting on github's markdown renderer
* README: add liberapay badge
* Mention viewmode key binding in man
</description>
<package>ranger</package>
</patchinfo>

View File

@@ -0,0 +1,19 @@
<patchinfo incident="packagehub-64">
<issue tracker="cve" id="2026-0628">VUL-0: CVE-2026-0628: chromium: Insufficient policy enforcement in WebView tag fixed in 143.0.7499.192</issue>
<issue tracker="bnc" id="1256067">VUL-0: CVE-2026-0628: chromium: Insufficient policy enforcement in WebView tag fixed in 143.0.7499.192</issue>
<packager>AndreasStieger</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for chromium</summary>
<description>This update for chromium fixes the following issues:
Changes in chromium:
- Chromium 143.0.7499.192 (boo#1256067):
* CVE-2026-0628: Insufficient policy enforcement in WebView tag
- Chromium 143.0.7499.169 (stable released 2025-12-18)
* no cve listed yet
</description>
<package>chromium</package>
</patchinfo>

View File

@@ -0,0 +1,12 @@
<patchinfo>
<packager>pgajdos</packager>
<rating>moderate</rating>
<category>optional</category>
<summary>Optional update for dehydrated</summary>
<description>This update for dehydrated fixes the following issues:
Adds dehydrated to PackageHub / Leap 16.0.
</description>
<package>dehydrated</package>
</patchinfo>

2
ranger

Submodule ranger updated: b2aa5fe5f7...4d06d462ce

1
rawtherapee Submodule

Submodule rawtherapee added at 67ee9041f2

2
trivy

Submodule trivy updated: cdbf0f01cd...1901ecd770

2
virtme

Submodule virtme updated: b4dd61c394...85fe0b3c34

View File

@@ -65,6 +65,7 @@
"mschnitzer",
"msmeissn",
"openqa-maintenance",
"rfrohl",
"foursixnine-openqa",
"szarate"
],