1
0

Compare commits

...

23 Commits

Author SHA256 Message Date
b128fafa87 Update submodules from pool/mosquitto#2 and create patchinfo.20260223091213884795.93181000773252/_patchinfo 2026-02-23 10:13:08 +01:00
9585913ba4 Update patchinfo incident numbers [skip actions] 2026-02-20 09:37:20 +00:00
AutoGits PR Review Bot
0c6e4787d8 Merging
PR: products/PackageHub!462
2026-02-20 09:36:41 +00:00
c39985f40e Update patchinfo incident numbers [skip actions] 2026-02-19 13:11:16 +00:00
AutoGits PR Review Bot
15b5c87491 Merging
PR: products/PackageHub!463
2026-02-19 13:10:32 +00:00
06b993c813 Update submodules from pool/python-Authlib#1 and create patchinfo.20260219090959320014.93181000773252/_patchinfo 2026-02-19 10:10:45 +01:00
a5635a82cb Update submodules from pool/chromium#37 and create patchinfo.20260219090019061643.93181000773252/_patchinfo 2026-02-19 10:01:02 +01:00
68e295fa97 Update patchinfo incident numbers [skip actions] 2026-02-18 09:13:11 +00:00
AutoGits PR Review Bot
4b305ad521 Merging
PR: products/PackageHub!445
2026-02-18 09:12:48 +00:00
ba6814261d Update patchinfo incident numbers [skip actions] 2026-02-18 08:22:41 +00:00
AutoGits PR Review Bot
9594d24459 Merging
PR: products/PackageHub!449
2026-02-18 08:22:20 +00:00
bb72ff1bc8 Update patchinfo incident numbers [skip actions] 2026-02-18 00:21:04 +00:00
AutoGits PR Review Bot
b12636faf6 Merging
PR: products/PackageHub!447
2026-02-18 00:20:44 +00:00
9e15f02282 Update patchinfo incident numbers [skip actions] 2026-02-17 17:38:24 +00:00
AutoGits PR Review Bot
5897264381 Merging
PR: products/PackageHub!448
2026-02-17 17:38:03 +00:00
53f62dea5d Add python-tenacity 2026-02-17 11:16:09 +01:00
f9ca4666ba Add python-pynetbox 2026-02-17 11:12:21 +01:00
5b687c4a59 Update patchinfo.20260213163213815955.255638743075857/_patchinfo
update patchinfo for latest pool PR update
2026-02-17 09:41:20 +01:00
AutoGits PR Review Bot
058e86b532 auto-created for chromium
This commit was autocreated by AutoGits PR Review Bot

referencing PRs:
 PR: pool/chromium!33
2026-02-17 08:34:45 +00:00
AutoGits PR Review Bot
a8d1ade5b7 auto-created for chromium
This commit was autocreated by AutoGits PR Review Bot

referencing PRs:
 PR: pool/chromium!33
2026-02-13 19:59:46 +00:00
AutoGits PR Review Bot
c125f5317e auto-created for chromium
This commit was autocreated by AutoGits PR Review Bot

referencing PRs:
 PR: pool/chromium!33
2026-02-13 19:41:49 +00:00
f366e3a76f Update patchinfo.20260213163213815955.255638743075857/_patchinfo
update patchinfo
2026-02-13 20:41:19 +01:00
3e972378ce Update submodules from pool/chromium#33 and create patchinfo.20260213163213815955.255638743075857/_patchinfo 2026-02-13 17:32:32 +01:00
13 changed files with 221 additions and 5 deletions

8
.gitmodules vendored
View File

@@ -15466,6 +15466,10 @@
path = python-PyKCS11
url = ../../pool/python-PyKCS11
branch = leap-16.0
[submodule "python-pynetbox"]
path = python-pynetbox
url = ../../pool/python-pynetbox
branch = leap-16.0
[submodule "python-PyPDF2"]
path = python-PyPDF2
url = ../../pool/python-PyPDF2
@@ -16870,6 +16874,10 @@
path = python-tcolorpy
url = ../../pool/python-tcolorpy
branch = leap-16.0
[submodule "python-tenacity"]
path = python-tenacity
url = ../../pool/python-tenacity
branch = leap-16.0
[submodule "python-textile"]
path = python-textile
url = ../../pool/python-textile

View File

@@ -0,0 +1,61 @@
<patchinfo incident="packagehub-134">
<issue tracker="cve" id="2026-2319"/>
<issue tracker="cve" id="2026-2322"/>
<issue tracker="cve" id="2026-2313"/>
<issue tracker="cve" id="2026-2318"/>
<issue tracker="cve" id="2026-2441"/>
<issue tracker="cve" id="2026-2316"/>
<issue tracker="bnc" id="1258185">VUL-0: CVE-2026-2441: chromium: Use after free in CSS (fixed in 145.0.7632.75)</issue>
<issue tracker="cve" id="2026-2323"/>
<issue tracker="cve" id="2026-2321"/>
<issue tracker="cve" id="2026-2317"/>
<issue tracker="bnc" id="1258116">VUL-0: chromium: release 145.0.7632.45</issue>
<issue tracker="cve" id="2026-2315"/>
<issue tracker="cve" id="2026-2320"/>
<issue tracker="cve" id="2026-2314"/>
<issue tracker="bnc" id="1258199">chromium desktop icon shows @@MENUNAME</issue>
<packager>oertel</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for chromium</summary>
<description>This update for chromium fixes the following issues:
Changes in chromium:
- more fixes for desktop file, some variables were lowercased,
further adaptions in INSTALL script (boo#1258199)
- also copy rollup into third_party/node/node_modules
- stay on llvm-10 for swiftshader but bring a similar patch
- drop use of rollup binaries and use rollup-3.x which does not
use prebuilt binaries (that fail at least on older ppc64le)
follow the approach of the debian packaging
- update/resync ppc64le patches from fedora
- fix INSTALL.sh again to replace the tags in desktop file,
appdata and manpage (boo#1258199)
- Chromium 145.0.7632.75:
* CVE-2026-2441: Use after free in CSS (boo#1258185)
- Chromium 145.0.7632.67:
* Revert a change in url_fixer that may have caused crashes
- Chromium 145.0.7632.45 (boo#1258116)
* jpeg-xl support has been readded
* CVE-2026-2313: Use after free in CSS
* CVE-2026-2314: Heap buffer overflow in Codecs
* CVE-2026-2315: Inappropriate implementation in WebGPU
* CVE-2026-2316: Insufficient policy enforcement in Frames
* CVE-2026-2317: Inappropriate implementation in Animation
* CVE-2026-2318: Inappropriate implementation in PictureInPicture
* CVE-2026-2319: Race in DevTools
* CVE-2026-2320: Inappropriate implementation in File input
* CVE-2026-2321: Use after free in Ozone
* CVE-2026-2322: Inappropriate implementation in File input
* CVE-2026-2323: Inappropriate implementation in Downloads
</description>
<package>chromium</package>
</patchinfo>

View File

@@ -0,0 +1,11 @@
<patchinfo incident="packagehub-132">
<packager>eroca</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for python-pynetbox</summary>
<description>This update for python-pynetbox fixes the following issues:
Introduce python-pynetbox.
</description>
<package>python-pynetbox</package>
</patchinfo>

View File

@@ -0,0 +1,11 @@
<patchinfo incident="packagehub-131">
<packager>eroca</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for python-tenacity</summary>
<description>This update for python-tenacity fixes the following issues:
Introduce python-tenacity.
</description>
<package>python-tenacity</package>
</patchinfo>

View File

@@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="packagehub-133">
<packager>eroca</packager>
<rating>moderate</rating>
<category>recommended</category>
@@ -9,4 +9,4 @@ Introduce python-radon and dependency python-mando.
</description>
<package>python-radon</package>
<package>python-mando</package>
</patchinfo>
</patchinfo>

View File

@@ -0,0 +1,20 @@
<patchinfo incident="packagehub-136">
<issue tracker="cve" id="2026-2649">VUL-0: chromium: update to 145.0.7632.109</issue>
<issue tracker="cve" id="2026-2650">VUL-0: chromium: update to 145.0.7632.109</issue>
<issue tracker="cve" id="2026-2648">VUL-0: chromium: update to 145.0.7632.109</issue>
<issue tracker="bnc" id="1258438">VUL-0: chromium: update to 145.0.7632.109</issue>
<packager>AndreasStieger</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for chromium</summary>
<description>This update for chromium fixes the following issues:
Changes in chromium:
- Chromium 145.0.7632.109 (boo#1258438):
* CVE-2026-2648: Heap buffer overflow in PDFium
* CVE-2026-2649: Integer overflow in V8
* CVE-2026-2650: Heap buffer overflow in Media
</description>
<package>chromium</package>
</patchinfo>

View File

@@ -0,0 +1,15 @@
<patchinfo incident="packagehub-135">
<issue tracker="bnc" id="1256414">VUL-0: CVE-2025-68158: python-Authlib: 1-click account takeover in applications that use the Authlib library</issue>
<issue tracker="cve" id="2025-68158">VUL-0: CVE-2025-68158: python-Authlib: 1-click account takeover in applications that use the Authlib library</issue>
<packager>nkrapp</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for python-Authlib</summary>
<description>This update for python-Authlib fixes the following issues:
Changes in python-Authlib:
- CVE-2025-68158: Fixed 1-click account takeover in applications that use the Authlib library (bsc#1256414)
</description>
<package>python-Authlib</package>
</patchinfo>

View File

@@ -0,0 +1,88 @@
<patchinfo>
<issue tracker="bnc" id="1258671">Mosquitto versions &gt; 2.0.11 and &lt; 2.0.23 have a data loss bug</issue>
<issue tracker="cve" id="2024-3935">VUL-0: CVE-2024-3935: mosquitto: double free and subsequent crash when running under bridge mode and processing remote connections</issue>
<issue tracker="bnc" id="1232636">VUL-0: CVE-2024-10525: mosquitto: out-of-bounds memory access when acting in an on_subscribe callback for a crafted SUBACK packet with no reason codes</issue>
<issue tracker="bnc" id="1232635">VUL-0: CVE-2024-3935: mosquitto: double free and subsequent crash when running under bridge mode and processing remote connections</issue>
<issue tracker="cve" id="2024-10525">VUL-0: CVE-2024-10525: mosquitto: out-of-bounds memory access when acting in an on_subscribe callback for a crafted SUBACK packet with no reason codes</issue>
<packager>AndreasStieger</packager>
<rating>critical</rating>
<category>security</category>
<summary>Security update for mosquitto</summary>
<description>This update for mosquitto fixes the following issues:
Changes in mosquitto:
- update to 2.0.23 (boo#1258671)
* Fix handling of disconnected sessions for `per_listener_settings
true`
* Check return values of openssl *_get_ex_data() and
*_set_ex_data() to prevent possible crash. This could occur only
in extremely unlikely situations
* Check return value of openssl ASN1_string_[get0_]data()
functions for NULL. This prevents a crash in case of incorrect
certificate handling in openssl
* Fix potential crash on startup if a malicious/corrupt
persistence file from mosquitto 1.5 or earlier is loaded
* Limit auto_id_prefix to 50 characters
- Update to version 2.0.22
Broker
* Bridge: Fix idle_timeout never occurring for lazy bridges.
* Fix case where max_queued_messages = 0 was not treated as
unlimited.
* Fix --version exit code and output.
* Fix crash on receiving a $CONTROL message over a bridge, if
per_listener_settings is set true and the bridge is carrying
out topic remapping.
* Fix incorrect reference clock being selected on startup on
Linux. Closes #3238.
* Fix reporting of client disconnections being incorrectly
attributed to "out of memory".
* Fix compilation when using WITH_OLD_KEEPALIVE.
* Fix problems with secure websockets.
* Fix crash on exit when using WITH_EPOLL=no.
* Fix clients being incorrectly expired when they have
keepalive == max_keepalive. Closes #3226, #3286.
Dynamic security plugin
* Fix mismatch memory free when saving config which caused
memory tracking to be incorrect.
Client library
* Fix C++ symbols being removed when compiled with link time
optimisation.
* TLS error handling was incorrectly setting a protocol error
for non-TLS errors. This would cause the mosquitto_loop_start()
thread to exit if no broker was available on the first
connection attempt. This has been fixed. Closes #3258.
* Fix linker errors on some architectures using cmake.
- Update to version 2.0.21
Broker
* Fix clients sending a RESERVED packet not being quickly
disconnected.
* Fix bind_interface producing an error when used with an
interface that has an IPv6 link-local address and no other
IPv6 addresses.
* Fix mismatched wrapped/unwrapped memory alloc/free in
properties.
* Fix allow_anonymous false not being applied in local only mode.
* Add retain_expiry_interval option to fix expired retained
message not being removed from memory if they are not
subscribed to.
* Produce an error if invalid combinations of
cafile/capath/certfile/keyfile are used.
* Backport keepalive checking from develop to fix problems in
current implementation.
Client library
* Fix potential deadlock in mosquitto_sub if -W is used.
Apps
* mosquitto_ctrl dynsec now also allows -i to specify a clientid
as well as -c. This matches the documentation which states -i.
Tests
* Fix 08-ssl-connect-cert-auth-expired and
08-ssl-connect-cert-auth-revoked tests when under load.
- systemd service: Wait till the network got setup to avoid
startup failure.
</description>
<package>mosquitto</package>
</patchinfo>

1
python-pynetbox Submodule

Submodule python-pynetbox added at b662d65c50

1
python-tenacity Submodule

Submodule python-tenacity added at 6ca3c97ae8