Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package glibc for openSUSE:Factory checked 
in at 2023-10-31 20:24:29
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/glibc (Old)
 and      /work/SRC/openSUSE:Factory/.glibc.new.17445 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "glibc"

Tue Oct 31 20:24:29 2023 rev:282 rq:1121134 version:2.38

Changes:
--------
--- /work/SRC/openSUSE:Factory/glibc/glibc.changes      2023-10-20 
23:15:23.579511863 +0200
+++ /work/SRC/openSUSE:Factory/.glibc.new.17445/glibc.changes   2023-10-31 
20:24:35.319491384 +0100
@@ -1,0 +2,5 @@
+Mon Oct 23 09:52:12 UTC 2023 - Andreas Schwab <sch...@suse.de>
+
+- gb18030-2022.patch: add GB18030-2022 charmap (jsc#PED-4908, BZ #30243)
+
+-------------------------------------------------------------------
@@ -131,0 +137,2 @@
+- bsc#1211828
+- bsc#1212819
@@ -140 +147,2 @@
-- gmon-buffer-alloc.patch: gmon: Fix allocated buffer overflow (BZ #29444)
+- gmon-buffer-alloc.patch: gmon: Fix allocated buffer overflow
+  (bsc#1207975, BZ #29444)
@@ -164 +172 @@
-  ASM written functions (bsc#1210777)
+  ASM written functions (bsc#1210777, bsc#1211726)
@@ -195,0 +204,3 @@
+- bsc#1207957
+- bsc#1208358
+- bsc#1212910
@@ -295,0 +307,3 @@
+- CVE-2023-4813, bsc#1215286
+- bsc#1198751
+- bsc#1200334
@@ -450,0 +465,6 @@
+- bsc#1194640
+- bsc#1194768
+- bsc#1194770
+- bsc#1197718
+- bsc#1211829
+- bsc#1215891
@@ -461 +481 @@
-- Add support for livepatches (JSC #SLE-20049).
+- Add support for livepatches (jsc#SLE-20049).
@@ -588,0 +609,2 @@
+    CVE-2021-35942: The wordexp function may overflow the positional
+    parameter number when processing the expansion resulting in a crash
@@ -593,0 +616,4 @@
+- bsc#1181403
+- bsc#1184035
+- bsc#1187911
+- jsc#PED-987
@@ -714,0 +741,4 @@
+- bsc#1180557
+- bsc#1181505
+- bsc#1191592
+- bsc#1201942
@@ -821,0 +852,11 @@
+- bsc#1027496
+- bsc#1162930
+- bsc#1166106
+- bsc#1167631
+- bsc#1167939
+- bsc#1194785, jsc#SLE-18195
+- bsc#1200855
+- bsc#1201560
+- bsc#1201640
+- bsc#1207571
+- jsc#SLE-13520
@@ -888,0 +930,4 @@
+- bsc#1157893
+- bsc#1163184
+- fate#325815, fate#325879, fate#325880, fate#325881, fate#325882
+- fate#325962
@@ -894 +939 @@
-  (bsc#1158996, BZ #25423)
+  (CVE-2020-1751, bsc#1158996, BZ #25423)
@@ -1004,0 +1050,2 @@
+- bsc#1100396
+- bsc#1130045
@@ -1125,0 +1173,7 @@
+- bsc#1114984
+- bsc#1114993
+- bsc#1122729
+- bsc#1131330
+- bsc#1149332
+- bsc#1151582
+- bsc#1164505
@@ -1239,0 +1294,5 @@
+- bsc#1092877
+- bsc#1102526
+- bsc#1112570
+- bsc#1126590
+- bsc#1127223
@@ -1401,0 +1461 @@
+- bsc#1063675
@@ -1605,0 +1666 @@
+- bsc#1074208

New:
----
  gb18030-2022.patch

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ glibc.spec ++++++
--- /var/tmp/diff_new_pack.PxGAS6/_old  2023-10-31 20:24:36.647540164 +0100
+++ /var/tmp/diff_new_pack.PxGAS6/_new  2023-10-31 20:24:36.651540310 +0100
@@ -329,6 +329,8 @@
 Patch1012:      setxid-propagate-glibc-tunables.patch
 # PATCH-FIX-UPSTREAM tunables: Terminate if end of input is reached 
(CVE-2023-4911)
 Patch1013:      tunables-string-parsing.patch
+# PATCH-FIX-UPSTREAM add GB18030-2022 charmap and test the entire GB18030 
charmap (BZ #30243)
+Patch1014:      gb18030-2022.patch
 
 ###
 # Patches awaiting upstream approval
@@ -565,6 +567,7 @@
 %patch1011 -p1
 %patch1012 -p1
 %patch1013 -p1
+%patch1014 -p1
 %endif
 
 %patch2000 -p1

++++++ gb18030-2022.patch ++++++
++++ 856 lines (skipped)

Reply via email to