Hello community,
here is the log from the commit of package patchinfo.1727 for
openSUSE:12.3:Update checked in at 2013-06-14 16:51:53
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.3:Update/patchinfo.1727 (Old)
and /work/SRC/openSUSE:12.3:Update/.patchinfo.1727.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.1727"
Changes:
--------
New Changes file:
NO CHANGES FILE!!!
New:
----
_patchinfo
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo>
<issue id="815451" tracker="bnc">VUL-0: xorg: upcoming fixes for xlib</issue>
<issue id="821671" tracker="bnc">VUL-0: xorg-x11-libXv: X.Org Security
Advisory: May 23, 2013</issue>
<issue id="CVE-2013-1989" tracker="cve" />
<issue id="CVE-2013-2066" tracker="cve" />
<category>security</category>
<rating>moderate</rating>
<packager>sndirsch</packager>
<description>This update of libXrender fixes several buffer and integer
overflow issues.
- U_0001-integer-overflow-in-XvQueryPortAttributes-CVE-2013-1.patch,
U_0002-integer-overflow-in-XvListImageFormats-CVE-2013-1989.patch,
U_0003-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch
* integer overflow in XvQueryPortAttributes(), XvListImageFormats(),
XvCreateImage() [CVE-2013-1989] (bnc#821671, bnc#815451)
- U_0001-buffer-overflow-in-XvQueryPortAttributes-CVE-2013-20.patch
* buffer overflow in XvQueryPortAttributes() [CVE-2013-2066]
(bnc#821671, bnc#815451)
</description>
<summary>update for libXv</summary>
</patchinfo>
--
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]