Hello community,

here is the log from the commit of package patchinfo.5640 for 
openSUSE:13.2:Update checked in at 2016-10-04 13:05:15
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5640 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.5640.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.5640"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="5640">
  <issue id="994359" tracker="bnc">VUL-0: CVE-2016-6323: glibc: Missing unwind 
information on ARM EABI (32-bit) causes backtrace generation to hang</issue>
  <issue id="994576" tracker="bnc">glibc resolver problem __libc_res_nquery 
assertion failed on unqualified hostname</issue>
  <issue id="2016-6323" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>Andreas_Schwab</packager>
  <description>
This update for glibc fixes the following issues:

Security issues fixed:
- arm: mark __startcontext as .cantunwind (CVE-2016-6323, boo#994359, BZ #20435)

Bugs fixed:
- aarch64: Merge __local_multiple_threads offset with memory reference
- Fix memory leak in regexp compiler (BZ #17069)
- Provide correct buffer length to netgroup queries in nscd (BZ #16695)
- Use NSS_STATUS_TRYAGAIN to indicate insufficient buffer (BZ #16878)
- aarch64: End frame record chain correctly (BZ #17555)
- _IO_wstr_overflow integer overflow (BZ #17269)
- Fix nscd lookup when netgroup has wildcards (BZ #16758, BZ #16759)
- Avoid overlapping addresses to stpcpy calls in nscd (BZ #16760)
- resolv: Always set *resplen2 out parameter in send_dg (boo#994576, BZ #19791)
- Fix memory handling in strxfrm_l (BZ #16009)
- Harden tls_dtor_list with pointer mangling (BZ #19018)
- open and openat ignore 'mode' with O_TMPFILE in flags (BZ #17523)
</description>
  <summary>Security update for glibc</summary>
</patchinfo>

Reply via email to