1
0

Compare commits

..

12 Commits

Author SHA256 Message Date
c63fe692ba Update submodules from pool/python-PyPDF2#3 and create patchinfo.20260306125446347687.93181000773252/_patchinfo 2026-03-06 13:58:40 +01:00
5ff509d04f Update patchinfo incident numbers [skip actions] 2026-03-05 18:20:54 +00:00
AutoGits PR Review Bot
9f18e2c029 Merging
PR: products/PackageHub!502
2026-03-05 18:20:13 +00:00
AutoGits PR Review Bot
4f61c0d3cd auto-created for roundcubemail
This commit was autocreated by AutoGits PR Review Bot

referencing PRs:
 PR: pool/roundcubemail!2
2026-03-05 14:43:57 +00:00
b7b6139c44 Update patchinfo incident numbers [skip actions] 2026-03-05 14:17:47 +00:00
AutoGits PR Review Bot
8dd9d70244 Merging
PR: products/PackageHub!500
2026-03-05 14:17:24 +00:00
AutoGits PR Review Bot
5672a763c3 Merging
PR: products/PackageHub!503
2026-03-05 14:16:53 +00:00
50e88b2706 Update patchinfo.20260304200727360655.93181000773252/_patchinfo
another try
2026-03-05 11:33:57 +01:00
7e6ac3f6ee Update patchinfo.20260304200727360655.93181000773252/_patchinfo
formating
2026-03-05 11:26:18 +01:00
d6d2e6bdac Update submodules from pool/python-joserfc#1 and create patchinfo.20260304200812703660.93181000773252/_patchinfo 2026-03-04 21:08:35 +01:00
181a7d6c6d Update submodules from pool/roundcubemail#2 and create patchinfo.20260304200727360655.93181000773252/_patchinfo 2026-03-04 21:07:59 +01:00
4e5411cb0e Update submodules from pool/obs-service-format_spec_file#2 and create patchinfo.20260304200535473806.93181000773252/_patchinfo 2026-03-04 21:05:46 +01:00
8 changed files with 196 additions and 4 deletions

View File

@@ -0,0 +1,43 @@
<patchinfo incident="packagehub-149">
<packager>dirkmueller</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for obs-service-format_spec_file</summary>
<description>This update for obs-service-format_spec_file fixes the following issues:
Changes in obs-service-format_spec_file:
- Add PKGBUILD to enable builds for Arch Linux
- Update to version 20250923:
* Update test case for changes in 1ccd56d0
* Empty section may contain empty lines instead of setting 'after_lines'
* Update test case for changes in 51da0388
* Fix _split_final_comments hack
- Update to version 20250918:
* Don't add unneeded empty lines after Copyrights
- Update to version 20250907:
* Update test cases
* Special handling for 'SUSE Software Solutions Germany' license
* Keep 3rd party licenses intact
* Keep SUSE T&amp;Cs close to SUSE Copyright
* Make create_copyright_section() return true when SUSE Copyright processed
- Update to version 20250804:
* Remove more LLC and contributors also from the copyright strings
- Update to version 20250725:
* Fix indentation to run checks on pull request
* Change autoadded copyright header to include "and contributors"
* Add 3 extra test-cases
* Run tests in github actions
* Preserve the order of multiple copyright lines.
* Allow for truly empty lines in copyright sections
* Accept empty lines in %changelog sections
* Update licenses
* Avoid using temporary files for tests
</description>
<package>obs-service-format_spec_file</package>
</patchinfo>

View File

@@ -0,0 +1,102 @@
<patchinfo incident="packagehub-151">
<issue tracker="cve" id="2025-68460"/>
<issue tracker="bnc" id="1258052">VUL-0: CVE-2026-26079: roundcubemail: Cascading Style Sheets (CSS) injection via mishandled comments</issue>
<issue tracker="bnc" id="1257909">VUL-0: CVE-2026-25916: roundcubemail: remote image blocking bypass via SVG content</issue>
<issue tracker="bnc" id="1255308">VUL-0: CVE-2025-68461: roundcubemail: crafted SVG animate tag can enable cross-site scripting (XSS)</issue>
<issue tracker="bnc" id="1255306">VUL-0: CVE-2025-68460: roundcubemail: HTML style sanitizer can cause information disclosure</issue>
<issue tracker="cve" id="2026-26079"/>
<issue tracker="cve" id="2025-68461"/>
<issue tracker="cve" id="2026-25916"/>
<packager>abergmann</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for roundcubemail</summary>
<description>This update for roundcubemail fixes the following issues:
Changes to roundcubemail:
Update to 1.6.13:
This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:
+ Fix CSS injection vulnerability reported by CERT Polska (boo#1258052,
CVE-2026-26079).
+ Fix remote image blocking bypass via SVG content reported by nullcathedral
(boo#1257909, CVE-2026-25916).
This version is considered stable and we recommend to update all productive
installations of Roundcube 1.6.x with it. Please do backup your data
before updating!
CHANGELOG
+ Managesieve: Fix handling of string-list format values for date
tests in Out of Office (#10075)
+ Fix CSS injection vulnerability reported by CERT Polska.
+ Fix remote image blocking bypass via SVG content reported by nullcathedral.
Update to 1.6.12:
This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
reported by Valentin T., CrowdStrike (boo#1255308, CVE-2025-68461).
+ Fix Information Disclosure vulnerability in the HTML style
sanitizer reported by somerandomdev (boo#1255306, CVE-2025-68460).
This version is considered stable and we recommend to update all
productive installations of Roundcube 1.6.x with it.
+ Support IPv6 in database DSN (#9937)
+ Don't force specific error_reporting setting
+ Fix compatibility with PHP 8.5 regarding array_first()
+ Remove X-XSS-Protection example from .htaccess file (#9875)
+ Fix "Assign to group" action state after creation of a first group (#9889)
+ Fix bug where contacts search would fail if contactlist_fields contained vcard fields (#9850)
+ Fix bug where an mbox export file could include inconsistent message delimiters (#9879)
+ Fix parsing of inline styles that aren't well-formatted (#9948)
+ Fix Cross-Site-Scripting vulnerability via SVG's animate tag
+ Fix Information Disclosure vulnerability in the HTML style sanitizer
Update to 1.6.11
This is a security update to the stable version 1.6 of Roundcube Webmail.
It provides fixes to recently reported security vulnerabilities:
* Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v.
- CHANGELOG
* Managesieve: Fix match-type selector (remove unsupported options) in delete header action (#9610)
* Improve installer to fix confusion about disabling SMTP authentication (#9801)
* Fix PHP warning in index.php (#9813)
* OAuth: Fix/improve token refresh
* Fix dark mode bug where wrong colors were used for blockquotes in HTML mail preview (#9820)
* Fix HTML message preview if it contains floating tables (#9804)
* Fix removing/expiring redis/memcache records when using a key prefix
* Fix bug where a wrong SPECIAL-USE folder could have been detected, if there were more than one per-type (#9781)
* Fix a default value and documentation of password_ldap_encodage option (#9658)
* Remove mobile/floating Create button from the list in Settings &gt; Folders (#9661)
* Fix Delete and Empty buttons state while creating a folder (#9047)
* Fix connecting to LDAP using ldapi:// URI (#8990)
* Fix cursor position on "below the quote" reply in HTML mode (#8700)
* Fix bug where attachments with content type of application/vnd.ms-tnef were not parsed (#7119)
Update to 1.6.10:
This is the next service release to update the stable version 1.6.
* IMAP: Partial support for ANNOTATE-EXPERIMENT-1 extension (RFC 5257)
* OAuth: Support standard authentication with short-living password received with OIDC token (#9530)
* Fix PHP warnings (#9616, #9611)
* Fix whitespace handling in vCard line continuation (#9637)
* Fix current script state after initial scripts creation in managesieve_kolab_master mode
* Fix rcube_imap::get_vendor() result (and PHP warning) on Zimbra server (#9650)
* Fix regression causing inline SVG images to be missing in mail preview (#9644)
* Fix plugin "virtuser_file" to handle backward slashes in username (#9668)
* Fix PHP fatal error when parsing some malformed BODYSTRUCTURE responses (#9689)
* Fix insert_or_update() and reading database server config on PostgreSQL (#9710)
* Fix Oauth issues with use_secure_urls=true (#9722)
* Fix handling of binary mail parts (e.g. PDF) encoded with quoted-printable (#9728)
* Fix links in comments and config to https:// where available (#9759, #9756)
* Fix decoding of attachment names encoded using both RFC2231 and RFC2047 standards (#9725)
</description>
<package>roundcubemail</package>
</patchinfo>

View File

@@ -0,0 +1,15 @@
<patchinfo incident="packagehub-150">
<issue tracker="bnc" id="1259154">VUL-0: CVE-2026-27932: python-joserfc: unbounded PBKDF2 iteration count can lead to a denial of service</issue>
<issue tracker="cve" id="2026-27932"/>
<packager>nkrapp</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for python-joserfc</summary>
<description>This update for python-joserfc fixes the following issues:
Changes in python-joserfc:
- CVE-2026-27932: unbounded PBKDF2 iteration count can lead to a denial of service (bsc#1259154)
</description>
<package>python-joserfc</package>
</patchinfo>

View File

@@ -0,0 +1,32 @@
<patchinfo>
<issue tracker="cve" id="2026-27025">VUL-0: CVE-2026-27025: python-pypdf: Possible long runtimes/large memory usage for large /ToUnicode streams</issue>
<issue tracker="cve" id="2025-55197">VUL-0: CVE-2025-55197: python-pypdf: Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used ...</issue>
<issue tracker="bnc" id="1248089"/>
<issue tracker="bnc" id="1258692"/>
<issue tracker="cve" id="2026-27628">VUL-0: CVE-2026-27628: python-pypdf: possible infinite loop when loading circular /Prev entries in cross-reference streams</issue>
<issue tracker="cve" id="2026-27888">VUL-0: CVE-2026-27888: python-pypdf: Manipulated FlateDecode XFA streams can exhaust RAM</issue>
<issue tracker="bnc" id="1258691"/>
<issue tracker="bnc" id="1258934"/>
<issue tracker="bnc" id="1258693"/>
<issue tracker="bnc" id="1258940"/>
<issue tracker="cve" id="2026-27024">VUL-0: CVE-2026-27024: python-pypdf: Possible infinite loop when processing TreeObject</issue>
<issue tracker="cve" id="2026-27026">VUL-0: CVE-2026-27026: python-pypdf: Possible long runtimes for malformed FlateDecode streams</issue>
<packager>mcalabkova</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for python-PyPDF2</summary>
<description>This update for python-PyPDF2 fixes the following issues:
Changes in python-PyPDF2:
- CVE-2026-27628: Fixed infinite loop when loading circular /Prev entries in cross-reference streams (bsc#1258940)
- CVE-2026-27888: Fixed issue where manipulated FlateDecode XFA streams can exhaust RAM (bsc#1258934)
- CVE-2025-55197: Fixed denial of service via craft PDF (bsc#1248089)
- CVE-2026-27024: Fixed infinite loop when processing TreeObject (bsc#1258691)
- CVE-2026-27025: Fixed long runtimes/large memory usage for large /ToUnicode streams (bsc#1258692)
- CVE-2026-27026: Fixed long runtimes for malformed FlateDecode streams (bsc#1258693)
- Convert to pip-based build
</description>
<package>python-PyPDF2</package>
</patchinfo>