Adding patchinfo patchinfo.20241209145038495555.90520734224241

This commit is contained in:
Adrian Schröter 2024-12-19 15:24:17 +01:00
parent 2f84930713
commit f7685251db
4 changed files with 28 additions and 3 deletions

2
.gitmodules vendored
View File

@ -7335,7 +7335,7 @@
url = ../../pool/rpcbind
[submodule "buildkit"]
path = buildkit
url = ../../pool/buildkit
url = ../../ALP-pool/buildkit
[submodule "perl-ExtUtils-Depends"]
path = perl-ExtUtils-Depends
url = ../../pool/perl-ExtUtils-Depends

2
avahi

@ -1 +1 @@
Subproject commit 5f57cbe813e4266eb349effa44dbd1129b48ee17
Subproject commit a82b8502740652071b822f209c7ded902e20ec55

@ -1 +1 @@
Subproject commit d5144c4f075796fbd4b454423a8ac90599f04541
Subproject commit e77dd00230f3be5b9b885063b021ec489eeb0da6

View File

@ -0,0 +1,25 @@
<patchinfo>
<!-- generated from request(s) 355307 -->
<issue tracker="bnc" id="1212476">patch shebang line match the python version required in the package</issue>
<issue tracker="bnc" id="1226586">avahi-browse -a fails with "Invalid service type"</issue>
<issue tracker="bnc" id="1233420">VUL-0: CVE-2024-52616: avahi: Avahi Wide-Area DNS Predictable Transaction IDs</issue>
<issue tracker="cve" id="2024-52616"/>
<packager>qzhao</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for avahi</summary>
<description>This update for avahi fixes the following issues:
- CVE-2024-52616: Properly randomize query id of DNS packets (bsc#1233420).
Bug fixes:
- No longer supply bogus services to callbacks (bsc#1226586).
- Tag hardening patches as PATCH-FEATURE-OPENSUSE
- Remove dependency on /usr/bin/python3 using %python3_fix_shebang macro (bsc#1212476).
</description>
<package>avahi</package>
<package>avahi:glib2</package>
<package>avahi:qt5</package>
<seperate_build_arch/>
</patchinfo>