1
0

Compare commits

...

21 Commits

Author SHA256 Message Date
e01601e63c Update patchinfo.20251227105430923343.187004354831441/_patchinfo
remove seperatte buildd arch
2025-12-29 14:02:39 +01:00
aeb1f73847 Update submodules from pool/apache2-mod_wsgi#2 and create patchinfo.20251227105430923343.187004354831441/_patchinfo 2025-12-27 11:54:38 +01:00
a47a0255a4 Update patchinfo incident numbers [skip actions] 2025-12-19 16:00:42 +00:00
AutoGits PR Review Bot
d08e2827bb Merging
PR: products/PackageHub!267
2025-12-19 16:00:18 +00:00
bc7de0e7cc Update patchinfo incident numbers [skip actions] 2025-12-19 15:30:01 +00:00
AutoGits PR Review Bot
8439743814 Merging
PR: products/PackageHub!281
2025-12-19 15:29:44 +00:00
AutoGits PR Review Bot
76091026db Merging
PR: products/PackageHub!289
2025-12-19 13:32:36 +00:00
AutoGits PR Review Bot
fc03ed1327 Merging
PR: products/PackageHub!277
2025-12-19 00:57:24 +00:00
6ae24600c5 Merge branch 'leap-16.0' into remove-rust 2025-12-18 21:00:23 +01:00
AutoGits PR Review Bot
51ad92059e Merging
PR: products/PackageHub!282
2025-12-18 12:53:13 +00:00
3aae949b7a Update submodules from pool/chromium#22 and create patchinfo.20251218074156387460.187004354831441/_patchinfo 2025-12-18 08:42:10 +01:00
158832bfe1 Update patchinfo incident numbers [skip actions] 2025-12-18 00:06:41 +00:00
AutoGits PR Review Bot
a7ed1a773d Merging
PR: products/PackageHub!286
2025-12-18 00:05:41 +00:00
AutoGits PR Review Bot
6b53d9f452 Merging
PR: products/PackageHub!285
2025-12-17 16:32:59 +00:00
3c973dcf63 Update submodules from pool/cheat#1 and create patchinfo.20251217091639760898.93181000773252/_patchinfo 2025-12-17 10:17:11 +01:00
fb57ec8f31 merge upstream 2025-12-15 14:02:28 +01:00
792ee49a40 Exclude rmt-server related packages from publishing (bsc#1253965) 2025-12-11 15:34:04 +01:00
Marcus Meissner
cd1bed3528 rust and cargo are shipped from SLES 2025-12-11 13:11:19 +00:00
Marcus Meissner
c8f2353703 remove golang-github-prometheus-prometheus from blacklist 2025-12-10 16:18:39 +00:00
4022efbf5d Update patchinfo.20251208143300643166.187004354831441/_patchinfo
remove seperate build arch
2025-12-10 09:36:04 +01:00
a85d786d1d Update submodules from pool/icinga-php-thirdparty#1, pool/icinga-php-library#1, pool/icingaweb2#1 and create patchinfo.20251208143300643166.187004354831441/_patchinfo 2025-12-08 15:33:15 +01:00
11 changed files with 197 additions and 8 deletions

View File

@@ -701,6 +701,9 @@ packagesets:
- cargo-packaging
- cargo1.87
- cargo1.88
- cargo1.89
- cargo1.90
- cargo1.91
- catatonit
- cblas-devel
- cblas-devel-static
@@ -1408,7 +1411,6 @@ packagesets:
- gobject-introspection-devel
- golang-github-cpuguy83-go-md2man
- golang-github-google-jsonnet
- golang-github-prometheus-prometheus
- golang-github-prometheus-promu
- golang-packaging
- google-errorprone-annotation
@@ -6796,6 +6798,9 @@ packagesets:
- rhino-engine
- rhino-javadoc
- rhino-runtime
- rmt-server
- rmt-server-config
- rmt-server-pubcloud
- rollback-helper
- rootlesskit
- rp-pppoe
@@ -6852,6 +6857,9 @@ packagesets:
- rust-keylime
- rust1.87
- rust1.88
- rust1.89
- rust1.90
- rust1.91
- samba
- samba-ad-dc
- samba-ad-dc-libs
@@ -7080,7 +7088,6 @@ packagesets:
- system-user-news
- system-user-nobody
- system-user-ntp
- system-user-prometheus
- system-user-pulse
- system-user-qemu
- system-user-root

2
cheat

Submodule cheat updated: 27656594fe...e8f7ed9227

View File

@@ -0,0 +1,63 @@
<patchinfo incident="packagehub-61">
<packager>bigironman</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for icinga-php-thirdparty, icinga-php-library, icingaweb2</summary>
<description>This update for icinga-php-thirdparty, icinga-php-library, icingaweb2 fixes the following issues:
Changes in icinga-php-thirdparty:
- Update to 0.13.1
- No changelog from upstream.
- Update to 0.12.1
- No changelog from upstream.
Changes in icinga-php-library:
- Update to 1.17.0
- No changelog from upstream.
Changes in icingaweb2:
- Update to 2.12.6
- Search box shows many magnifying glasses for some community themes #5395
- Authentication hooks are not called with external backends #5415
- Improve Minimal layout #5386
- Update to 2.12.5
* PHP 8.4 Support
We're again a little behind schedule, but now we support PHP 8.4!
This means that installations on Ubuntu 25.04 and Fedora 42+ can
now install Icinga Web without worrying about PHP related
incompatibilities. Icinga packages will be available in the
next few days.
* Good Things Take Time
There's only a single (notable) recent issue that is fixed
with this release. All the others are a bit older.
- External URLs set up as dashlets are not embedded the same
as navigation items #5346
* But the team sat together a few weeks ago and fixed a bug here
and there. And of course, also in Icinga Web!
- Users who are not allowed to change the theme, cannot change
the theme mode either #5385
- Improved compatibility with several SSO authentication
providers #5000, #5227
- Filtering for older-than events with relative time does not
work #5263
- Empty values are NULL in CSV exports #5350
* Breaking, Somewhat
This is mainly for developers.
With the support of PHP 8.4, we introduced a new environment
variable, ICINGAWEB_ENVIRONMENT. Unless set to dev, Icinga Web
will not show nor log deprecation notices anymore.
</description>
<package>icinga-php-thirdparty</package>
<package>icinga-php-library</package>
<package>icingaweb2</package>
</patchinfo>

View File

@@ -0,0 +1,65 @@
<patchinfo incident="packagehub-59">
<issue tracker="cve" id="2025-21614">CVE-2025-21614 go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies</issue>
<issue tracker="bnc" id="1247629">VUL-0: CVE-2025-21613: cheat: github.com/go-git/go-git/v5: argument injection via the URL field</issue>
<issue tracker="cve" id="2025-58181">VUL-0: CVE-2025-58181: TRACKERBUG: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
<issue tracker="cve" id="2025-21613">VUL-0: CVE-2025-21613: TRACKERBUG: github.com/go-git/go-git/v5: argument injection via the URL field</issue>
<issue tracker="cve" id="2025-47913">VUL-0: CVE-2025-47913: TRACKERBUG: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or</issue>
<issue tracker="bnc" id="1253922">VUL-0: CVE-2025-58181: cheat: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
<issue tracker="cve" id="2025-47914">VUL-0: CVE-2025-47914: TRACKERBUG: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue>
<issue tracker="cve" id="2025-22870">VUL-0: CVE-2025-22870: TRACKERBUG: golang.org/net/http, golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue>
<issue tracker="cve" id="2023-48795">VUL-0: CVE-2023-48795: openssh: prefix truncation breaking ssh channel integrity aka Terrapin Attack</issue>
<issue tracker="bnc" id="1254051">VUL-0: CVE-2025-47914: cheat: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue>
<issue tracker="bnc" id="1253593">VUL-0: CVE-2025-47913: cheat: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or signing request</issue>
<issue tracker="cve" id="2025-22869">VUL-0: CVE-2025-22869: TRACKERBUG: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh</issue>
<packager>witekbedyk</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for cheat</summary>
<description>This update for cheat fixes the following issues:
- Security:
* CVE-2025-47913: Fix client process termination (bsc#1253593)
* CVE-2025-58181: Fix potential unbounded memory consumption (bsc#1253922)
* CVE-2025-47914: Fix panic due to an out of bounds read (bsc#1254051)
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.45.0
* Replace golang.org/x/net=golang.org/x/net@v0.47.0
* Replace golang.org/x/sys=golang.org/x/sys@v0.38.0
- Packaging improvements:
* Drop Requires: golang-packaging. The recommended Go toolchain
dependency expression is BuildRequires: golang(API) &gt;= 1.x or
optionally the metapackage BuildRequires: go
* Use BuildRequires: golang(API) &gt;= 1.19 matching go.mod
* Build PIE with pattern that may become recommended procedure:
%%ifnarch ppc64 GOFLAGS="-buildmode=pie" %%endif go build
A go toolchain buildmode default config would be preferable
but none exist at this time.
* Drop mod=vendor, go1.14+ will detect vendor dir and auto-enable
* Remove go build -o output binary location and name. Default
binary has the same name as package of func main() and is
placed in the top level of the build directory.
* Add basic %check to execute binary --help
- Packaging improvements:
* Service go_modules replace dependencies with CVEs
* Replace github.com/cloudflare/circl=github.com/cloudflare/circl@v1.6.1
Fix GO-2025-3754 GHSA-2x5j-vhc8-9cwm
* Replace golang.org/x/net=golang.org/x/net@v0.36.0
Fixes GO-2025-3503 CVE-2025-22870
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.35.0
Fixes GO-2023-2402 CVE-2023-48795 GHSA-45x7-px36-x8w8
Fixes GO-2025-3487 CVE-2025-22869
* Replace github.com/go-git/go-git/v5=github.com/go-git/go-git/v5@v5.13.0
Fixes GO-2025-3367 CVE-2025-21614 GHSA-r9px-m959-cxf4
Fixes GO-2025-3368 CVE-2025-21613 GHSA-v725-9546-7q7m
* Service tar_scm set mode manual from disabled
* Service tar_scm create archive from git so we can exclude
vendor directory upstream committed to git. Committed vendor
directory contents have build issues even after go mod tidy.
* Service tar_scm exclude dir vendor
* Service set_version set mode manual from disabled
* Service set_version remove param basename not needed
</description>
<package>cheat</package>
<seperate_build_arch/>
</patchinfo>

View File

@@ -0,0 +1,21 @@
<patchinfo incident="packagehub-60">
<issue tracker="cve" id="2025-14766">VUL-0: chromium: release 143.0.7499.146</issue>
<issue tracker="cve" id="2025-14174">Google Chrome: chromium: Out of bounds memory access via crafted HTML page</issue>
<issue tracker="bnc" id="1255115">VUL-0: chromium: release 143.0.7499.146</issue>
<issue tracker="cve" id="2025-14765">VUL-0: chromium: release 143.0.7499.146</issue>
<packager>oertel</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for chromium</summary>
<description>This update for chromium fixes the following issues:
Changes in chromium:
Chromium 143.0.7499.146 (boo#1255115):
* CVE-2025-14765: Use after free in WebGPU
* CVE-2025-14766: Out of bounds read and write in V8
* CVE-2025-14174: Out of bounds memory access in ANGLE
</description>
<package>chromium</package>
</patchinfo>

View File

@@ -0,0 +1,33 @@
<patchinfo>
<packager>pgajdos</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for apache2-mod_wsgi</summary>
<description>This update for apache2-mod_wsgi fixes the following issues:
Changes in apache2-mod_wsgi:
- Don't enable the module by default. Instead, include instructions in the
description, consistent with other comparable modules, such as
apache2-mod_fcgid, apache2-mod_jk and apache2-mod_mono. If a reverse
dependency of this module requires it, that package may execute
`a2enmod wsgi`.
Update to 5.0.2 includes changes from 5.0.1:
* Eliminate noise in logs under Python 3.13 when Python garbage collection
decides to delay destruction of objects until a second phase, resulting in
the wsgi.errors log object being accessed after the request had been
completed and the log object marked as invalid. This resulted due to changes
in garbage collection behaviour in Python 3.13.
* Internally, when using Python 3.8 or newer, the PyConfig API will now be
used due to deprecation and future removal of older C API alternatives.
This was required to support Python 3.13.
* Fix issue which could result in process crashing when values were supplied
for user/password/realm of HTTP basic authentication which werent
compliant with UTF-8 encoding format.
* Fix memory leak in check_password() authentication hook handler.
* Change use of deprecated thread.setDaemon to thread.daemon.
</description>
<package>apache2-mod_wsgi</package>
</patchinfo>