Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package glibc for openSUSE:Factory checked in at 2023-10-31 20:24:29 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/glibc (Old) and /work/SRC/openSUSE:Factory/.glibc.new.17445 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "glibc" Tue Oct 31 20:24:29 2023 rev:282 rq:1121134 version:2.38 Changes: -------- --- /work/SRC/openSUSE:Factory/glibc/glibc.changes 2023-10-20 23:15:23.579511863 +0200 +++ /work/SRC/openSUSE:Factory/.glibc.new.17445/glibc.changes 2023-10-31 20:24:35.319491384 +0100 @@ -1,0 +2,5 @@ +Mon Oct 23 09:52:12 UTC 2023 - Andreas Schwab <schwab@suse.de> + +- gb18030-2022.patch: add GB18030-2022 charmap (jsc#PED-4908, BZ #30243) + +------------------------------------------------------------------- @@ -131,0 +137,2 @@ +- bsc#1211828 +- bsc#1212819 @@ -140 +147,2 @@ -- gmon-buffer-alloc.patch: gmon: Fix allocated buffer overflow (BZ #29444) +- gmon-buffer-alloc.patch: gmon: Fix allocated buffer overflow + (bsc#1207975, BZ #29444) @@ -164 +172 @@ - ASM written functions (bsc#1210777) + ASM written functions (bsc#1210777, bsc#1211726) @@ -195,0 +204,3 @@ +- bsc#1207957 +- bsc#1208358 +- bsc#1212910 @@ -295,0 +307,3 @@ +- CVE-2023-4813, bsc#1215286 +- bsc#1198751 +- bsc#1200334 @@ -450,0 +465,6 @@ +- bsc#1194640 +- bsc#1194768 +- bsc#1194770 +- bsc#1197718 +- bsc#1211829 +- bsc#1215891 @@ -461 +481 @@ -- Add support for livepatches (JSC #SLE-20049). +- Add support for livepatches (jsc#SLE-20049). @@ -588,0 +609,2 @@ + CVE-2021-35942: The wordexp function may overflow the positional + parameter number when processing the expansion resulting in a crash @@ -593,0 +616,4 @@ +- bsc#1181403 +- bsc#1184035 +- bsc#1187911 +- jsc#PED-987 @@ -714,0 +741,4 @@ +- bsc#1180557 +- bsc#1181505 +- bsc#1191592 +- bsc#1201942 @@ -821,0 +852,11 @@ +- bsc#1027496 +- bsc#1162930 +- bsc#1166106 +- bsc#1167631 +- bsc#1167939 +- bsc#1194785, jsc#SLE-18195 +- bsc#1200855 +- bsc#1201560 +- bsc#1201640 +- bsc#1207571 +- jsc#SLE-13520 @@ -888,0 +930,4 @@ +- bsc#1157893 +- bsc#1163184 +- fate#325815, fate#325879, fate#325880, fate#325881, fate#325882 +- fate#325962 @@ -894 +939 @@ - (bsc#1158996, BZ #25423) + (CVE-2020-1751, bsc#1158996, BZ #25423) @@ -1004,0 +1050,2 @@ +- bsc#1100396 +- bsc#1130045 @@ -1125,0 +1173,7 @@ +- bsc#1114984 +- bsc#1114993 +- bsc#1122729 +- bsc#1131330 +- bsc#1149332 +- bsc#1151582 +- bsc#1164505 @@ -1239,0 +1294,5 @@ +- bsc#1092877 +- bsc#1102526 +- bsc#1112570 +- bsc#1126590 +- bsc#1127223 @@ -1401,0 +1461 @@ +- bsc#1063675 @@ -1605,0 +1666 @@ +- bsc#1074208 New: ---- gb18030-2022.patch ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ glibc.spec ++++++ --- /var/tmp/diff_new_pack.PxGAS6/_old 2023-10-31 20:24:36.647540164 +0100 +++ /var/tmp/diff_new_pack.PxGAS6/_new 2023-10-31 20:24:36.651540310 +0100 @@ -329,6 +329,8 @@ Patch1012: setxid-propagate-glibc-tunables.patch # PATCH-FIX-UPSTREAM tunables: Terminate if end of input is reached (CVE-2023-4911) Patch1013: tunables-string-parsing.patch +# PATCH-FIX-UPSTREAM add GB18030-2022 charmap and test the entire GB18030 charmap (BZ #30243) +Patch1014: gb18030-2022.patch ### # Patches awaiting upstream approval @@ -565,6 +567,7 @@ %patch1011 -p1 %patch1012 -p1 %patch1013 -p1 +%patch1014 -p1 %endif %patch2000 -p1 ++++++ gb18030-2022.patch ++++++ ++++ 856 lines (skipped)