Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package podman for openSUSE:Factory checked 
in at 2025-06-26 11:34:29
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/podman (Old)
 and      /work/SRC/openSUSE:Factory/.podman.new.7067 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "podman"

Thu Jun 26 11:34:29 2025 rev:161 rq:1288469 version:5.5.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/podman/podman.changes    2025-06-10 
08:57:09.539259439 +0200
+++ /work/SRC/openSUSE:Factory/.podman.new.7067/podman.changes  2025-06-26 
11:34:40.070200754 +0200
@@ -1,0 +2,14 @@
+Wed Jun 25 04:50:07 UTC 2025 - Johannes Kastl 
<opensuse_buildserv...@ojkastl.de>
+
+- Update to version 5.5.2:
+  * Security
+    - This release addresses CVE-2025-6032, in which the TLS
+      connection used to pull VM images for podman machine was, by
+      default, not validated, allowing connections to servers with
+      invalid certificates by default and potentially allowing a
+      Man in the Middle attack.
+  * Bugfixes
+    - Fixed a bug where Podman could panic after a reboot on
+      systems with pods containing containers (#26469).
+
+-------------------------------------------------------------------

Old:
----
  podman-5.5.1.obscpio

New:
----
  podman-5.5.2.obscpio

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ podman.spec ++++++
--- /var/tmp/diff_new_pack.k9RA9V/_old  2025-06-26 11:34:41.782271778 +0200
+++ /var/tmp/diff_new_pack.k9RA9V/_new  2025-06-26 11:34:41.782271778 +0200
@@ -22,7 +22,7 @@
 %bcond_without  apparmor
 
 Name:           podman
-Version:        5.5.1
+Version:        5.5.2
 Release:        0
 Summary:        Daemon-less container engine for managing containers, pods and 
images
 License:        Apache-2.0

++++++ _service ++++++
--- /var/tmp/diff_new_pack.k9RA9V/_old  2025-06-26 11:34:41.822273438 +0200
+++ /var/tmp/diff_new_pack.k9RA9V/_new  2025-06-26 11:34:41.826273604 +0200
@@ -2,7 +2,7 @@
   <service name="obs_scm" mode="manual">
     <param name="url">https://github.com/containers/podman.git</param>
     <param name="scm">git</param>
-    <param name="revision">v5.5.1</param>
+    <param name="revision">v5.5.2</param>
     <param name="versionformat">@PARENT_TAG@</param>
     <param name="changesgenerate">enable</param>
     <param name="versionrewrite-pattern">v(.*)</param>

++++++ _servicedata ++++++
--- /var/tmp/diff_new_pack.k9RA9V/_old  2025-06-26 11:34:41.850274599 +0200
+++ /var/tmp/diff_new_pack.k9RA9V/_new  2025-06-26 11:34:41.854274765 +0200
@@ -1,6 +1,6 @@
 <servicedata>
 <service name="tar_scm">
                 <param 
name="url">https://github.com/containers/podman.git</param>
-              <param 
name="changesrevision">850db76dd78a0641eddb9ee19ee6f60d2c59bcfa</param></service></servicedata>
+              <param 
name="changesrevision">e7d8226745ba07a64b7176a7f128e4ef53225a0e</param></service></servicedata>
 (No newline at EOF)
 

++++++ podman-5.5.1.obscpio -> podman-5.5.2.obscpio ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/podman-5.5.1/.github/workflows/update-podmanio.yml 
new/podman-5.5.2/.github/workflows/update-podmanio.yml
--- old/podman-5.5.1/.github/workflows/update-podmanio.yml      2025-06-05 
20:25:35.000000000 +0200
+++ new/podman-5.5.2/.github/workflows/update-podmanio.yml      2025-06-24 
16:41:45.000000000 +0200
@@ -6,7 +6,16 @@
   workflow_dispatch:
     inputs:
       version:
-        description: 'Release version to build and upload (e.g. "v9.8.7")'
+        description: 'Release version to bump on podman.io'
+        required: true
+  workflow_call:
+    inputs:
+      version:
+        description: 'Release version to bump on podman.io'
+        type: string
+        required: true
+    secrets:
+      PODMANBOT_TOKEN:
         required: true
 
 jobs:
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/podman-5.5.1/RELEASE_NOTES.md 
new/podman-5.5.2/RELEASE_NOTES.md
--- old/podman-5.5.1/RELEASE_NOTES.md   2025-06-05 20:25:35.000000000 +0200
+++ new/podman-5.5.2/RELEASE_NOTES.md   2025-06-24 16:41:45.000000000 +0200
@@ -1,5 +1,12 @@
 # Release Notes
 
+## 5.5.2
+### Security
+- This release addresses CVE-2025-6032, in which the TLS connection used to 
pull VM images for `podman machine` was, by default, not validated, allowing 
connections to servers with invalid certificates by default and potentially 
allowing a Man in the Middle attack.
+
+### Bugfixes
+- Fixed a bug where Podman could panic after a reboot on systems with pods 
containing containers 
([#26469](https://github.com/containers/podman/issues/26469)).
+
 ## 5.5.1
 ### Bugfixes
 - Fixed a bug where containers mounting a volume to `/` could overmount 
important directories such as `/proc` causing start and/or runtime failures due 
to an issue with mount ordering 
([#26161](https://github.com/containers/podman/issues/26161)).
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/podman-5.5.1/cmd/podman/root.go 
new/podman-5.5.2/cmd/podman/root.go
--- old/podman-5.5.1/cmd/podman/root.go 2025-06-05 20:25:35.000000000 +0200
+++ new/podman-5.5.2/cmd/podman/root.go 2025-06-24 16:41:45.000000000 +0200
@@ -293,6 +293,34 @@
                                }
                        }
                }
+
+               if cmd.Flag("cpu-profile").Changed {
+                       f, err := os.Create(podmanConfig.CPUProfile)
+                       if err != nil {
+                               return err
+                       }
+                       if err := pprof.StartCPUProfile(f); err != nil {
+                               return err
+                       }
+               }
+               if cmd.Flag("memory-profile").Changed {
+                       // Same value as the default in github.com/pkg/profile.
+                       runtime.MemProfileRate = 4096
+                       if rate := os.Getenv("MemProfileRate"); rate != "" {
+                               r, err := strconv.Atoi(rate)
+                               if err != nil {
+                                       return err
+                               }
+                               runtime.MemProfileRate = r
+                       }
+               }
+
+               if podmanConfig.MaxWorks <= 0 {
+                       return fmt.Errorf("maximum workers must be set to a 
positive number (got %d)", podmanConfig.MaxWorks)
+               }
+               if err := parallel.SetMaxThreads(uint(podmanConfig.MaxWorks)); 
err != nil {
+                       return err
+               }
        }
 
        if err := readRemoteCliFlags(cmd, podmanConfig); err != nil {
@@ -346,35 +374,6 @@
                }
        }
 
-       if !registry.IsRemote() {
-               if cmd.Flag("cpu-profile").Changed {
-                       f, err := os.Create(podmanConfig.CPUProfile)
-                       if err != nil {
-                               return err
-                       }
-                       if err := pprof.StartCPUProfile(f); err != nil {
-                               return err
-                       }
-               }
-               if cmd.Flag("memory-profile").Changed {
-                       // Same value as the default in github.com/pkg/profile.
-                       runtime.MemProfileRate = 4096
-                       if rate := os.Getenv("MemProfileRate"); rate != "" {
-                               r, err := strconv.Atoi(rate)
-                               if err != nil {
-                                       return err
-                               }
-                               runtime.MemProfileRate = r
-                       }
-               }
-
-               if podmanConfig.MaxWorks <= 0 {
-                       return fmt.Errorf("maximum workers must be set to a 
positive number (got %d)", podmanConfig.MaxWorks)
-               }
-               if err := parallel.SetMaxThreads(uint(podmanConfig.MaxWorks)); 
err != nil {
-                       return err
-               }
-       }
        // Setup Rootless environment, IFF:
        // 1) in ABI mode
        // 2) running as non-root
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/podman-5.5.1/pkg/machine/ocipull/ociartifact.go 
new/podman-5.5.2/pkg/machine/ocipull/ociartifact.go
--- old/podman-5.5.1/pkg/machine/ocipull/ociartifact.go 2025-06-05 
20:25:35.000000000 +0200
+++ new/podman-5.5.2/pkg/machine/ocipull/ociartifact.go 2025-06-24 
16:41:45.000000000 +0200
@@ -224,7 +224,7 @@
        }
        fmt.Printf("Looking up Podman Machine image at %s to create VM\n", 
imgRef.DockerReference())
        sysCtx := &types.SystemContext{
-               DockerInsecureSkipTLSVerify: 
types.NewOptionalBool(!o.pullOptions.TLSVerify),
+               DockerInsecureSkipTLSVerify: o.pullOptions.SkipTLSVerify,
        }
        imgSrc, err := imgRef.NewImageSource(o.ctx, sysCtx)
        if err != nil {
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/podman-5.5.1/pkg/machine/ocipull/pull.go 
new/podman-5.5.2/pkg/machine/ocipull/pull.go
--- old/podman-5.5.1/pkg/machine/ocipull/pull.go        2025-06-05 
20:25:35.000000000 +0200
+++ new/podman-5.5.2/pkg/machine/ocipull/pull.go        2025-06-24 
16:41:45.000000000 +0200
@@ -21,8 +21,8 @@
 // PullOptions includes data to alter certain knobs when pulling a source
 // image.
 type PullOptions struct {
-       // Require HTTPS and verify certificates when accessing the registry.
-       TLSVerify bool
+       // Skip TLS verification when accessing the registry.
+       SkipTLSVerify types.OptionalBool
        // [username[:password] to use when connecting to the registry.
        Credentials string
        // Quiet the progress bars when pushing.
@@ -46,7 +46,7 @@
        }
 
        sysCtx := &types.SystemContext{
-               DockerInsecureSkipTLSVerify: 
types.NewOptionalBool(!options.TLSVerify),
+               DockerInsecureSkipTLSVerify: options.SkipTLSVerify,
        }
        if options.Credentials != "" {
                authConf, err := parse.AuthConfig(options.Credentials)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/podman-5.5.1/rpm/podman.spec 
new/podman-5.5.2/rpm/podman.spec
--- old/podman-5.5.1/rpm/podman.spec    2025-06-05 20:25:35.000000000 +0200
+++ new/podman-5.5.2/rpm/podman.spec    2025-06-24 16:41:45.000000000 +0200
@@ -17,6 +17,9 @@
 
 %if %{defined copr_username}
 %define copr_build 1
+%if "%{copr_username}" == "rhcontainerbot" && "%{copr_projectname}" == 
"podman-next"
+%define next_build 1
+%endif
 %endif
 
 # Only RHEL and CentOS Stream rpms are built with fips-enabled go compiler
@@ -44,7 +47,7 @@
 %endif
 
 Name: podman
-%if %{defined copr_build}
+%if %{defined next_build}
 Epoch: 102
 %else
 Epoch: 5
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/podman-5.5.1/version/rawversion/version.go 
new/podman-5.5.2/version/rawversion/version.go
--- old/podman-5.5.1/version/rawversion/version.go      2025-06-05 
20:25:35.000000000 +0200
+++ new/podman-5.5.2/version/rawversion/version.go      2025-06-24 
16:41:45.000000000 +0200
@@ -7,4 +7,4 @@
 //
 // NOTE: remember to bump the version at the top of the top-level README.md
 // file when this is bumped.
-const RawVersion = "5.5.1"
+const RawVersion = "5.5.2"

++++++ podman.obsinfo ++++++
--- /var/tmp/diff_new_pack.k9RA9V/_old  2025-06-26 11:34:46.118451662 +0200
+++ /var/tmp/diff_new_pack.k9RA9V/_new  2025-06-26 11:34:46.122451828 +0200
@@ -1,5 +1,5 @@
 name: podman
-version: 5.5.1
-mtime: 1749147935
-commit: 850db76dd78a0641eddb9ee19ee6f60d2c59bcfa
+version: 5.5.2
+mtime: 1750776105
+commit: e7d8226745ba07a64b7176a7f128e4ef53225a0e
 

Reply via email to