Hello community,

here is the log from the commit of package patchinfo.1727 for 
openSUSE:12.2:Update checked in at 2013-06-14 16:51:51
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:12.2:Update/patchinfo.1727 (Old)
 and      /work/SRC/openSUSE:12.2:Update/.patchinfo.1727.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.1727"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo>
  <issue id="815451" tracker="bnc">VUL-0: xorg: upcoming fixes for xlib</issue>
  <issue id="821671" tracker="bnc">VUL-0: xorg-x11-libXv: X.Org Security 
Advisory: May 23, 2013</issue>
  <issue id="CVE-2013-1989" tracker="cve" />
  <issue id="CVE-2013-2066" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>sndirsch</packager>
  <description>This update of libXrender fixes several buffer and integer 
overflow issues.
- U_0001-integer-overflow-in-XvQueryPortAttributes-CVE-2013-1.patch,
  U_0002-integer-overflow-in-XvListImageFormats-CVE-2013-1989.patch,
  U_0003-integer-overflow-in-XvCreateImage-CVE-2013-1989-3-3.patch
  * integer overflow in XvQueryPortAttributes(), XvListImageFormats(),
    XvCreateImage() [CVE-2013-1989] (bnc#821671, bnc#815451)
- U_0001-buffer-overflow-in-XvQueryPortAttributes-CVE-2013-20.patch
  * buffer overflow in XvQueryPortAttributes() [CVE-2013-2066]
    (bnc#821671, bnc#815451)
</description>
  <summary>update for libXv</summary>
</patchinfo>
-- 
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to