Hello community, here is the log from the commit of package patchinfo.1158 for openSUSE:12.2:Update checked in at 2012-12-17 12:05:18 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:12.2:Update/patchinfo.1158 (Old) and /work/SRC/openSUSE:12.2:Update/.patchinfo.1158.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.1158", Maintainer is "" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="1158"> <packager>vitezslav_cizek</packager> <issue tracker="cve" id="CVE-2012-5134"></issue> <issue tracker="bnc" id="793334">VUL-0: CVE-2012-5134: libxml2 heap overflow in entity decoding</issue> <category>security</category> <rating>important</rating> <summary>libxml2: fixed buffer overflow during decoding entities</summary> <description>A Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 allowed remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document. </description> </patchinfo> -- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
