forked from products/PackageHub
Compare commits
12 Commits
leap-16.0
...
maintenanc
| Author | SHA256 | Date | |
|---|---|---|---|
| c63fe692ba | |||
| 5ff509d04f | |||
|
|
9f18e2c029 | ||
|
|
4f61c0d3cd | ||
| b7b6139c44 | |||
|
|
8dd9d70244 | ||
|
|
5672a763c3 | ||
| 50e88b2706 | |||
| 7e6ac3f6ee | |||
| d6d2e6bdac | |||
| 181a7d6c6d | |||
| 4e5411cb0e |
Submodule obs-service-format_spec_file updated: b0dd956763...feabae86cb
43
patchinfo.20260304200535473806.93181000773252/_patchinfo
Normal file
43
patchinfo.20260304200535473806.93181000773252/_patchinfo
Normal file
@@ -0,0 +1,43 @@
|
||||
<patchinfo incident="packagehub-149">
|
||||
<packager>dirkmueller</packager>
|
||||
<rating>moderate</rating>
|
||||
<category>recommended</category>
|
||||
<summary>Recommended update for obs-service-format_spec_file</summary>
|
||||
<description>This update for obs-service-format_spec_file fixes the following issues:
|
||||
|
||||
Changes in obs-service-format_spec_file:
|
||||
|
||||
- Add PKGBUILD to enable builds for Arch Linux
|
||||
|
||||
- Update to version 20250923:
|
||||
* Update test case for changes in 1ccd56d0
|
||||
* Empty section may contain empty lines instead of setting 'after_lines'
|
||||
* Update test case for changes in 51da0388
|
||||
* Fix _split_final_comments hack
|
||||
|
||||
- Update to version 20250918:
|
||||
* Don't add unneeded empty lines after Copyrights
|
||||
|
||||
- Update to version 20250907:
|
||||
* Update test cases
|
||||
* Special handling for 'SUSE Software Solutions Germany' license
|
||||
* Keep 3rd party licenses intact
|
||||
* Keep SUSE T&Cs close to SUSE Copyright
|
||||
* Make create_copyright_section() return true when SUSE Copyright processed
|
||||
|
||||
- Update to version 20250804:
|
||||
* Remove more LLC and contributors also from the copyright strings
|
||||
|
||||
- Update to version 20250725:
|
||||
* Fix indentation to run checks on pull request
|
||||
* Change autoadded copyright header to include "and contributors"
|
||||
* Add 3 extra test-cases
|
||||
* Run tests in github actions
|
||||
* Preserve the order of multiple copyright lines.
|
||||
* Allow for truly empty lines in copyright sections
|
||||
* Accept empty lines in %changelog sections
|
||||
* Update licenses
|
||||
* Avoid using temporary files for tests
|
||||
</description>
|
||||
<package>obs-service-format_spec_file</package>
|
||||
</patchinfo>
|
||||
102
patchinfo.20260304200727360655.93181000773252/_patchinfo
Normal file
102
patchinfo.20260304200727360655.93181000773252/_patchinfo
Normal file
@@ -0,0 +1,102 @@
|
||||
<patchinfo incident="packagehub-151">
|
||||
<issue tracker="cve" id="2025-68460"/>
|
||||
<issue tracker="bnc" id="1258052">VUL-0: CVE-2026-26079: roundcubemail: Cascading Style Sheets (CSS) injection via mishandled comments</issue>
|
||||
<issue tracker="bnc" id="1257909">VUL-0: CVE-2026-25916: roundcubemail: remote image blocking bypass via SVG content</issue>
|
||||
<issue tracker="bnc" id="1255308">VUL-0: CVE-2025-68461: roundcubemail: crafted SVG animate tag can enable cross-site scripting (XSS)</issue>
|
||||
<issue tracker="bnc" id="1255306">VUL-0: CVE-2025-68460: roundcubemail: HTML style sanitizer can cause information disclosure</issue>
|
||||
<issue tracker="cve" id="2026-26079"/>
|
||||
<issue tracker="cve" id="2025-68461"/>
|
||||
<issue tracker="cve" id="2026-25916"/>
|
||||
<packager>abergmann</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for roundcubemail</summary>
|
||||
<description>This update for roundcubemail fixes the following issues:
|
||||
|
||||
Changes to roundcubemail:
|
||||
|
||||
Update to 1.6.13:
|
||||
|
||||
This is a security update to the stable version 1.6 of Roundcube Webmail.
|
||||
It provides fixes to recently reported security vulnerabilities:
|
||||
+ Fix CSS injection vulnerability reported by CERT Polska (boo#1258052,
|
||||
CVE-2026-26079).
|
||||
+ Fix remote image blocking bypass via SVG content reported by nullcathedral
|
||||
(boo#1257909, CVE-2026-25916).
|
||||
|
||||
This version is considered stable and we recommend to update all productive
|
||||
installations of Roundcube 1.6.x with it. Please do backup your data
|
||||
before updating!
|
||||
|
||||
CHANGELOG
|
||||
+ Managesieve: Fix handling of string-list format values for date
|
||||
tests in Out of Office (#10075)
|
||||
+ Fix CSS injection vulnerability reported by CERT Polska.
|
||||
+ Fix remote image blocking bypass via SVG content reported by nullcathedral.
|
||||
|
||||
Update to 1.6.12:
|
||||
|
||||
This is a security update to the stable version 1.6 of Roundcube Webmail.
|
||||
It provides fixes to recently reported security vulnerabilities:
|
||||
|
||||
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
|
||||
reported by Valentin T., CrowdStrike (boo#1255308, CVE-2025-68461).
|
||||
+ Fix Information Disclosure vulnerability in the HTML style
|
||||
sanitizer reported by somerandomdev (boo#1255306, CVE-2025-68460).
|
||||
|
||||
This version is considered stable and we recommend to update all
|
||||
productive installations of Roundcube 1.6.x with it.
|
||||
|
||||
+ Support IPv6 in database DSN (#9937)
|
||||
+ Don't force specific error_reporting setting
|
||||
+ Fix compatibility with PHP 8.5 regarding array_first()
|
||||
+ Remove X-XSS-Protection example from .htaccess file (#9875)
|
||||
+ Fix "Assign to group" action state after creation of a first group (#9889)
|
||||
+ Fix bug where contacts search would fail if contactlist_fields contained vcard fields (#9850)
|
||||
+ Fix bug where an mbox export file could include inconsistent message delimiters (#9879)
|
||||
+ Fix parsing of inline styles that aren't well-formatted (#9948)
|
||||
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
|
||||
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
|
||||
|
||||
Update to 1.6.11
|
||||
|
||||
This is a security update to the stable version 1.6 of Roundcube Webmail.
|
||||
It provides fixes to recently reported security vulnerabilities:
|
||||
* Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v.
|
||||
|
||||
- CHANGELOG
|
||||
* Managesieve: Fix match-type selector (remove unsupported options) in delete header action (#9610)
|
||||
* Improve installer to fix confusion about disabling SMTP authentication (#9801)
|
||||
* Fix PHP warning in index.php (#9813)
|
||||
* OAuth: Fix/improve token refresh
|
||||
* Fix dark mode bug where wrong colors were used for blockquotes in HTML mail preview (#9820)
|
||||
* Fix HTML message preview if it contains floating tables (#9804)
|
||||
* Fix removing/expiring redis/memcache records when using a key prefix
|
||||
* Fix bug where a wrong SPECIAL-USE folder could have been detected, if there were more than one per-type (#9781)
|
||||
* Fix a default value and documentation of password_ldap_encodage option (#9658)
|
||||
* Remove mobile/floating Create button from the list in Settings > Folders (#9661)
|
||||
* Fix Delete and Empty buttons state while creating a folder (#9047)
|
||||
* Fix connecting to LDAP using ldapi:// URI (#8990)
|
||||
* Fix cursor position on "below the quote" reply in HTML mode (#8700)
|
||||
* Fix bug where attachments with content type of application/vnd.ms-tnef were not parsed (#7119)
|
||||
|
||||
Update to 1.6.10:
|
||||
|
||||
This is the next service release to update the stable version 1.6.
|
||||
* IMAP: Partial support for ANNOTATE-EXPERIMENT-1 extension (RFC 5257)
|
||||
* OAuth: Support standard authentication with short-living password received with OIDC token (#9530)
|
||||
* Fix PHP warnings (#9616, #9611)
|
||||
* Fix whitespace handling in vCard line continuation (#9637)
|
||||
* Fix current script state after initial scripts creation in managesieve_kolab_master mode
|
||||
* Fix rcube_imap::get_vendor() result (and PHP warning) on Zimbra server (#9650)
|
||||
* Fix regression causing inline SVG images to be missing in mail preview (#9644)
|
||||
* Fix plugin "virtuser_file" to handle backward slashes in username (#9668)
|
||||
* Fix PHP fatal error when parsing some malformed BODYSTRUCTURE responses (#9689)
|
||||
* Fix insert_or_update() and reading database server config on PostgreSQL (#9710)
|
||||
* Fix Oauth issues with use_secure_urls=true (#9722)
|
||||
* Fix handling of binary mail parts (e.g. PDF) encoded with quoted-printable (#9728)
|
||||
* Fix links in comments and config to https:// where available (#9759, #9756)
|
||||
* Fix decoding of attachment names encoded using both RFC2231 and RFC2047 standards (#9725)
|
||||
</description>
|
||||
<package>roundcubemail</package>
|
||||
</patchinfo>
|
||||
15
patchinfo.20260304200812703660.93181000773252/_patchinfo
Normal file
15
patchinfo.20260304200812703660.93181000773252/_patchinfo
Normal file
@@ -0,0 +1,15 @@
|
||||
<patchinfo incident="packagehub-150">
|
||||
<issue tracker="bnc" id="1259154">VUL-0: CVE-2026-27932: python-joserfc: unbounded PBKDF2 iteration count can lead to a denial of service</issue>
|
||||
<issue tracker="cve" id="2026-27932"/>
|
||||
<packager>nkrapp</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for python-joserfc</summary>
|
||||
<description>This update for python-joserfc fixes the following issues:
|
||||
|
||||
Changes in python-joserfc:
|
||||
|
||||
- CVE-2026-27932: unbounded PBKDF2 iteration count can lead to a denial of service (bsc#1259154)
|
||||
</description>
|
||||
<package>python-joserfc</package>
|
||||
</patchinfo>
|
||||
32
patchinfo.20260306125446347687.93181000773252/_patchinfo
Normal file
32
patchinfo.20260306125446347687.93181000773252/_patchinfo
Normal file
@@ -0,0 +1,32 @@
|
||||
<patchinfo>
|
||||
<issue tracker="cve" id="2026-27025">VUL-0: CVE-2026-27025: python-pypdf: Possible long runtimes/large memory usage for large /ToUnicode streams</issue>
|
||||
<issue tracker="cve" id="2025-55197">VUL-0: CVE-2025-55197: python-pypdf: Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used ...</issue>
|
||||
<issue tracker="bnc" id="1248089"/>
|
||||
<issue tracker="bnc" id="1258692"/>
|
||||
<issue tracker="cve" id="2026-27628">VUL-0: CVE-2026-27628: python-pypdf: possible infinite loop when loading circular /Prev entries in cross-reference streams</issue>
|
||||
<issue tracker="cve" id="2026-27888">VUL-0: CVE-2026-27888: python-pypdf: Manipulated FlateDecode XFA streams can exhaust RAM</issue>
|
||||
<issue tracker="bnc" id="1258691"/>
|
||||
<issue tracker="bnc" id="1258934"/>
|
||||
<issue tracker="bnc" id="1258693"/>
|
||||
<issue tracker="bnc" id="1258940"/>
|
||||
<issue tracker="cve" id="2026-27024">VUL-0: CVE-2026-27024: python-pypdf: Possible infinite loop when processing TreeObject</issue>
|
||||
<issue tracker="cve" id="2026-27026">VUL-0: CVE-2026-27026: python-pypdf: Possible long runtimes for malformed FlateDecode streams</issue>
|
||||
<packager>mcalabkova</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for python-PyPDF2</summary>
|
||||
<description>This update for python-PyPDF2 fixes the following issues:
|
||||
|
||||
Changes in python-PyPDF2:
|
||||
|
||||
- CVE-2026-27628: Fixed infinite loop when loading circular /Prev entries in cross-reference streams (bsc#1258940)
|
||||
- CVE-2026-27888: Fixed issue where manipulated FlateDecode XFA streams can exhaust RAM (bsc#1258934)
|
||||
- CVE-2025-55197: Fixed denial of service via craft PDF (bsc#1248089)
|
||||
- CVE-2026-27024: Fixed infinite loop when processing TreeObject (bsc#1258691)
|
||||
- CVE-2026-27025: Fixed long runtimes/large memory usage for large /ToUnicode streams (bsc#1258692)
|
||||
- CVE-2026-27026: Fixed long runtimes for malformed FlateDecode streams (bsc#1258693)
|
||||
|
||||
- Convert to pip-based build
|
||||
</description>
|
||||
<package>python-PyPDF2</package>
|
||||
</patchinfo>
|
||||
Submodule python-PyPDF2 updated: 231b3346ed...a6942256f7
Submodule python-joserfc updated: 132f44019c...281e2a569b
Submodule roundcubemail updated: 0ba59f25c7...b09e0f3ab0
Reference in New Issue
Block a user