1
0

Compare commits

..

8 Commits

11 changed files with 49 additions and 49 deletions

4
.gitmodules vendored
View File

@@ -26242,3 +26242,7 @@
path = openQA-devel-container
url = ../../pool/openQA-devel-container
branch = leap-16.0
[submodule "uzdoom"]
path = uzdoom
url = ../../pool/uzdoom
branch = leap-16.0

2
niri

Submodule niri updated: de5c060c81...d66708d6ef

View File

@@ -0,0 +1,12 @@
<patchinfo incident="packagehub-85">
<issue tracker="bnc" id="1254975">niri doesn't set the right portal notification proxy</issue>
<packager>mantarimay</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for niri</summary>
<description>This update for niri fixes the following issues:
- Fixed portal notification proxy (boo#1254975)
</description>
<package>niri</package>
</patchinfo>

View File

@@ -1,44 +0,0 @@
<patchinfo>
<packager>DocB</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for tryton, trytond, gnuhealth</summary>
<description>This update for tryton, trytond, gnuhealth fixes the following issues:
Changes in tryton:
- Version 7.0.31 - Bugfix Release
- Version 7.0.29 - Bugfix Release
Changes in trytond:
- Version 7.0.42 - Bugfix Release
- Version 7.0.40 - Bugfix Release
- Version 7.0.38 - Bugfix Release
- Version 7.0.37 - Bugfix Release
- Version 7.0.36 - Security Release for issue #14220
- Version 7.0.35 - Bugfix Release
- Version 7.0.34 - Bugfix Release
- Version 7.0.33 - Bugfix Release
Changes in gnuhealth:
- version 5.0.2
* inconsistent naming of package and directories, switch to local copy
* gnuhealth.keyring removed due to local copy
* Remove unused dependencies from health module
* Wrong cursor field teeth (dentistry module)
* remove pillow dependency from lab and dentistry
</description>
<package>tryton</package>
<package>trytond</package>
<package>gnuhealth</package>
</patchinfo>

View File

@@ -0,0 +1,15 @@
<patchinfo incident="packagehub-86">
<issue tracker="cve" id="2025-68616">VUL-0: CVE-2025-68616: python-weasyprint: server-side request forgery (SSRF) protection bypass via HTTP redirects allows access to internal network resources</issue>
<issue tracker="bnc" id="1256936">VUL-0: CVE-2025-68616: python-weasyprint: server-side request forgery (SSRF) protection bypass via HTTP redirects allows access to internal network resources</issue>
<packager>dgarcia</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for python-weasyprint</summary>
<description>This update for python-weasyprint fixes the following issues:
Changes in python-weasyprint:
- CVE-2025-68616: Fixed a server-side request forgery in default fetcher (boo#1256936).
</description>
<package>python-weasyprint</package>
</patchinfo>

View File

@@ -0,0 +1,12 @@
<patchinfo>
<packager>eroca</packager>
<rating>moderate</rating>
<category>recommended</category>
<summary>Recommended update for uzdoom</summary>
<description>This update for uzdoom fixes the following issues:
Introduces uzdoom.
</description>
<package>uzdoom</package>
</patchinfo>

2
tryton

Submodule tryton updated: ec0aed3e09...9fb234c6f1

Submodule trytond updated: 18db1b639e...f23469c42b

1
uzdoom Submodule

Submodule uzdoom added at 9a62caf05a