forked from products/PackageHub
Compare commits
24 Commits
workflow
...
maintenanc
| Author | SHA256 | Date | |
|---|---|---|---|
| 8fac4ab323 | |||
| 262eddbb2e | |||
| a47a0255a4 | |||
|
|
d08e2827bb | ||
| bc7de0e7cc | |||
|
|
8439743814 | ||
|
|
76091026db | ||
|
|
fc03ed1327 | ||
| 6ae24600c5 | |||
|
|
51ad92059e | ||
| 3aae949b7a | |||
| 158832bfe1 | |||
|
|
a7ed1a773d | ||
|
|
6b53d9f452 | ||
| 7cf3e1410d | |||
|
|
9d8b838644 | ||
| 3c973dcf63 | |||
| fb57ec8f31 | |||
|
|
bbb50fccd1 | ||
| 792ee49a40 | |||
|
|
cd1bed3528 | ||
|
|
c8f2353703 | ||
| 4022efbf5d | |||
| a85d786d1d |
@@ -701,6 +701,9 @@ packagesets:
|
||||
- cargo-packaging
|
||||
- cargo1.87
|
||||
- cargo1.88
|
||||
- cargo1.89
|
||||
- cargo1.90
|
||||
- cargo1.91
|
||||
- catatonit
|
||||
- cblas-devel
|
||||
- cblas-devel-static
|
||||
@@ -1408,7 +1411,6 @@ packagesets:
|
||||
- gobject-introspection-devel
|
||||
- golang-github-cpuguy83-go-md2man
|
||||
- golang-github-google-jsonnet
|
||||
- golang-github-prometheus-prometheus
|
||||
- golang-github-prometheus-promu
|
||||
- golang-packaging
|
||||
- google-errorprone-annotation
|
||||
@@ -6796,6 +6798,9 @@ packagesets:
|
||||
- rhino-engine
|
||||
- rhino-javadoc
|
||||
- rhino-runtime
|
||||
- rmt-server
|
||||
- rmt-server-config
|
||||
- rmt-server-pubcloud
|
||||
- rollback-helper
|
||||
- rootlesskit
|
||||
- rp-pppoe
|
||||
@@ -6852,6 +6857,9 @@ packagesets:
|
||||
- rust-keylime
|
||||
- rust1.87
|
||||
- rust1.88
|
||||
- rust1.89
|
||||
- rust1.90
|
||||
- rust1.91
|
||||
- samba
|
||||
- samba-ad-dc
|
||||
- samba-ad-dc-libs
|
||||
@@ -7080,7 +7088,6 @@ packagesets:
|
||||
- system-user-news
|
||||
- system-user-nobody
|
||||
- system-user-ntp
|
||||
- system-user-prometheus
|
||||
- system-user-pulse
|
||||
- system-user-qemu
|
||||
- system-user-root
|
||||
|
||||
2
_config
2
_config
@@ -168,7 +168,7 @@ Macros:
|
||||
|
||||
# Leap specific package list, the same list with excludebuild must add to Backports project
|
||||
# Most of package should be built in Backports
|
||||
%if "%_project" == "openSUSE:Backports:SLE-16.0"
|
||||
%if 0%{?_is_in_project}
|
||||
# we build ffado:ffado-mixer for openSUSE, the main one is built in SLFO
|
||||
BuildFlags: excludebuild:ffado
|
||||
# build gpgme:qt flavor for qt5 support
|
||||
|
||||
2
cheat
2
cheat
Submodule cheat updated: 27656594fe...e8f7ed9227
2
chromium
2
chromium
Submodule chromium updated: 63710dd6ca...96724d1d02
Submodule icinga-php-library updated: 2adfe405c4...dcb9868560
Submodule icinga-php-thirdparty updated: 045c6cef83...83db62c3c8
Submodule icingaweb2 updated: 3772b35d84...640fad7a20
2
matio
2
matio
Submodule matio updated: a301162ce9...cab79b5274
63
patchinfo.20251208143300643166.187004354831441/_patchinfo
Normal file
63
patchinfo.20251208143300643166.187004354831441/_patchinfo
Normal file
@@ -0,0 +1,63 @@
|
||||
<patchinfo incident="packagehub-61">
|
||||
<packager>bigironman</packager>
|
||||
<rating>moderate</rating>
|
||||
<category>recommended</category>
|
||||
<summary>Recommended update for icinga-php-thirdparty, icinga-php-library, icingaweb2</summary>
|
||||
<description>This update for icinga-php-thirdparty, icinga-php-library, icingaweb2 fixes the following issues:
|
||||
|
||||
Changes in icinga-php-thirdparty:
|
||||
|
||||
- Update to 0.13.1
|
||||
|
||||
- No changelog from upstream.
|
||||
|
||||
- Update to 0.12.1
|
||||
|
||||
- No changelog from upstream.
|
||||
|
||||
Changes in icinga-php-library:
|
||||
|
||||
- Update to 1.17.0
|
||||
|
||||
- No changelog from upstream.
|
||||
|
||||
Changes in icingaweb2:
|
||||
|
||||
- Update to 2.12.6
|
||||
|
||||
- Search box shows many magnifying glasses for some community themes #5395
|
||||
- Authentication hooks are not called with external backends #5415
|
||||
- Improve Minimal layout #5386
|
||||
|
||||
- Update to 2.12.5
|
||||
|
||||
* PHP 8.4 Support
|
||||
We're again a little behind schedule, but now we support PHP 8.4!
|
||||
This means that installations on Ubuntu 25.04 and Fedora 42+ can
|
||||
now install Icinga Web without worrying about PHP related
|
||||
incompatibilities. Icinga packages will be available in the
|
||||
next few days.
|
||||
* Good Things Take Time
|
||||
There's only a single (notable) recent issue that is fixed
|
||||
with this release. All the others are a bit older.
|
||||
- External URLs set up as dashlets are not embedded the same
|
||||
as navigation items #5346
|
||||
* But the team sat together a few weeks ago and fixed a bug here
|
||||
and there. And of course, also in Icinga Web!
|
||||
- Users who are not allowed to change the theme, cannot change
|
||||
the theme mode either #5385
|
||||
- Improved compatibility with several SSO authentication
|
||||
providers #5000, #5227
|
||||
- Filtering for older-than events with relative time does not
|
||||
work #5263
|
||||
- Empty values are NULL in CSV exports #5350
|
||||
* Breaking, Somewhat
|
||||
This is mainly for developers.
|
||||
With the support of PHP 8.4, we introduced a new environment
|
||||
variable, ICINGAWEB_ENVIRONMENT. Unless set to dev, Icinga Web
|
||||
will not show nor log deprecation notices anymore.
|
||||
</description>
|
||||
<package>icinga-php-thirdparty</package>
|
||||
<package>icinga-php-library</package>
|
||||
<package>icingaweb2</package>
|
||||
</patchinfo>
|
||||
65
patchinfo.20251217091639760898.93181000773252/_patchinfo
Normal file
65
patchinfo.20251217091639760898.93181000773252/_patchinfo
Normal file
@@ -0,0 +1,65 @@
|
||||
<patchinfo incident="packagehub-59">
|
||||
<issue tracker="cve" id="2025-21614">CVE-2025-21614 go-git: go-git clients vulnerable to DoS via maliciously crafted Git server replies</issue>
|
||||
<issue tracker="bnc" id="1247629">VUL-0: CVE-2025-21613: cheat: github.com/go-git/go-git/v5: argument injection via the URL field</issue>
|
||||
<issue tracker="cve" id="2025-58181">VUL-0: CVE-2025-58181: TRACKERBUG: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
|
||||
<issue tracker="cve" id="2025-21613">VUL-0: CVE-2025-21613: TRACKERBUG: github.com/go-git/go-git/v5: argument injection via the URL field</issue>
|
||||
<issue tracker="cve" id="2025-47913">VUL-0: CVE-2025-47913: TRACKERBUG: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or</issue>
|
||||
<issue tracker="bnc" id="1253922">VUL-0: CVE-2025-58181: cheat: golang.org/x/crypto/ssh: invalidated number of mechanisms can cause unbounded memory consumption</issue>
|
||||
<issue tracker="cve" id="2025-47914">VUL-0: CVE-2025-47914: TRACKERBUG: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue>
|
||||
<issue tracker="cve" id="2025-22870">VUL-0: CVE-2025-22870: TRACKERBUG: golang.org/net/http, golang.org/x/net/proxy, golang.org/x/net/http/httpproxy: proxy bypass using IPv6 zone IDs</issue>
|
||||
<issue tracker="cve" id="2023-48795">VUL-0: CVE-2023-48795: openssh: prefix truncation breaking ssh channel integrity aka Terrapin Attack</issue>
|
||||
<issue tracker="bnc" id="1254051">VUL-0: CVE-2025-47914: cheat: golang.org/x/crypto/ssh/agent: non validated message size can cause a panic due to an out of bounds read</issue>
|
||||
<issue tracker="bnc" id="1253593">VUL-0: CVE-2025-47913: cheat: golang.org/x/crypto/ssh/agent: client process termination when receiving an unexpected message type in response to a key listing or signing request</issue>
|
||||
<issue tracker="cve" id="2025-22869">VUL-0: CVE-2025-22869: TRACKERBUG: golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh</issue>
|
||||
<packager>witekbedyk</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for cheat</summary>
|
||||
<description>This update for cheat fixes the following issues:
|
||||
|
||||
- Security:
|
||||
* CVE-2025-47913: Fix client process termination (bsc#1253593)
|
||||
* CVE-2025-58181: Fix potential unbounded memory consumption (bsc#1253922)
|
||||
* CVE-2025-47914: Fix panic due to an out of bounds read (bsc#1254051)
|
||||
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.45.0
|
||||
* Replace golang.org/x/net=golang.org/x/net@v0.47.0
|
||||
* Replace golang.org/x/sys=golang.org/x/sys@v0.38.0
|
||||
|
||||
- Packaging improvements:
|
||||
* Drop Requires: golang-packaging. The recommended Go toolchain
|
||||
dependency expression is BuildRequires: golang(API) >= 1.x or
|
||||
optionally the metapackage BuildRequires: go
|
||||
* Use BuildRequires: golang(API) >= 1.19 matching go.mod
|
||||
* Build PIE with pattern that may become recommended procedure:
|
||||
%%ifnarch ppc64 GOFLAGS="-buildmode=pie" %%endif go build
|
||||
A go toolchain buildmode default config would be preferable
|
||||
but none exist at this time.
|
||||
* Drop mod=vendor, go1.14+ will detect vendor dir and auto-enable
|
||||
* Remove go build -o output binary location and name. Default
|
||||
binary has the same name as package of func main() and is
|
||||
placed in the top level of the build directory.
|
||||
* Add basic %check to execute binary --help
|
||||
|
||||
- Packaging improvements:
|
||||
* Service go_modules replace dependencies with CVEs
|
||||
* Replace github.com/cloudflare/circl=github.com/cloudflare/circl@v1.6.1
|
||||
Fix GO-2025-3754 GHSA-2x5j-vhc8-9cwm
|
||||
* Replace golang.org/x/net=golang.org/x/net@v0.36.0
|
||||
Fixes GO-2025-3503 CVE-2025-22870
|
||||
* Replace golang.org/x/crypto=golang.org/x/crypto@v0.35.0
|
||||
Fixes GO-2023-2402 CVE-2023-48795 GHSA-45x7-px36-x8w8
|
||||
Fixes GO-2025-3487 CVE-2025-22869
|
||||
* Replace github.com/go-git/go-git/v5=github.com/go-git/go-git/v5@v5.13.0
|
||||
Fixes GO-2025-3367 CVE-2025-21614 GHSA-r9px-m959-cxf4
|
||||
Fixes GO-2025-3368 CVE-2025-21613 GHSA-v725-9546-7q7m
|
||||
* Service tar_scm set mode manual from disabled
|
||||
* Service tar_scm create archive from git so we can exclude
|
||||
vendor directory upstream committed to git. Committed vendor
|
||||
directory contents have build issues even after go mod tidy.
|
||||
* Service tar_scm exclude dir vendor
|
||||
* Service set_version set mode manual from disabled
|
||||
* Service set_version remove param basename not needed
|
||||
</description>
|
||||
<package>cheat</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
21
patchinfo.20251218074156387460.187004354831441/_patchinfo
Normal file
21
patchinfo.20251218074156387460.187004354831441/_patchinfo
Normal file
@@ -0,0 +1,21 @@
|
||||
<patchinfo incident="packagehub-60">
|
||||
<issue tracker="cve" id="2025-14766">VUL-0: chromium: release 143.0.7499.146</issue>
|
||||
<issue tracker="cve" id="2025-14174">Google Chrome: chromium: Out of bounds memory access via crafted HTML page</issue>
|
||||
<issue tracker="bnc" id="1255115">VUL-0: chromium: release 143.0.7499.146</issue>
|
||||
<issue tracker="cve" id="2025-14765">VUL-0: chromium: release 143.0.7499.146</issue>
|
||||
<packager>oertel</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for chromium</summary>
|
||||
<description>This update for chromium fixes the following issues:
|
||||
|
||||
Changes in chromium:
|
||||
|
||||
Chromium 143.0.7499.146 (boo#1255115):
|
||||
|
||||
* CVE-2025-14765: Use after free in WebGPU
|
||||
* CVE-2025-14766: Out of bounds read and write in V8
|
||||
* CVE-2025-14174: Out of bounds memory access in ANGLE
|
||||
</description>
|
||||
<package>chromium</package>
|
||||
</patchinfo>
|
||||
33
patchinfo.20260106101959221503.93181000773252/_patchinfo
Normal file
33
patchinfo.20260106101959221503.93181000773252/_patchinfo
Normal file
@@ -0,0 +1,33 @@
|
||||
<patchinfo>
|
||||
<issue tracker="bnc" id="1239678">VUL-0: CVE-2025-2337: matio: heap buffer overflow in function Mat_VarPrint of file src/mat.c</issue>
|
||||
<issue tracker="cve" id="2025-2337">VUL-0: CVE-2025-2337: matio: heap buffer overflow in function Mat_VarPrint of file src/mat.c</issue>
|
||||
<issue tracker="cve" id="2025-2338">VUL-0: CVE-2025-2338: matio: heap buffer overflow in function strdup_vprintf of file src/io.c</issue>
|
||||
<issue tracker="bnc" id="1239677">VUL-0: CVE-2025-2338: matio: heap buffer overflow in function strdup_vprintf of file src/io.c</issue>
|
||||
<packager>AndreasStieger</packager>
|
||||
<rating>important</rating>
|
||||
<category>security</category>
|
||||
<summary>Security update for matio</summary>
|
||||
<description>This update for matio fixes the following issues:
|
||||
|
||||
- update to version 1.5.29:
|
||||
* Fix printing rank-1-variable in Mat_VarPrint
|
||||
* Fix array index out of bounds in Mat_VarPrint when printing
|
||||
UTF-8 character data (boo#1239678, CVE-2025-2337)
|
||||
* Fix heap-based buffer overflow in strdup_vprintf
|
||||
(boo#1239677, CVE-2025-2338)
|
||||
* Changed Mat_VarPrint to print all values of rank-2-variable
|
||||
* Several other fixes, for example for access violations in
|
||||
Mat_VarPrint
|
||||
|
||||
- Update to version 1.5.28:
|
||||
* Fixed bug writing MAT_T_INT8/MAT_T_UINT8 encoded character
|
||||
array to compressed v5 MAT file (regression of v1.5.12).
|
||||
* Fixed bug reading all-zero sparse array of v4 MAT file
|
||||
(regression of v1.5.18).
|
||||
* Updated C99 snprintf.c.
|
||||
* CMake: Enabled testing.
|
||||
* Several other fixes, for example for access violations in
|
||||
Mat_VarPrint.
|
||||
</description>
|
||||
<package>matio</package>
|
||||
</patchinfo>
|
||||
Reference in New Issue
Block a user