Hello community, here is the log from the commit of package patchinfo.2635 for openSUSE:13.1:Update checked in at 2014-03-18 09:02:50 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.1:Update/patchinfo.2635 (Old) and /work/SRC/openSUSE:13.1:Update/.patchinfo.2635.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.2635" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo> <issue id="865854" tracker="bnc">VUL-0: CVE-2014-0004: udisks: udisks2: local code execution</issue> <issue id="CVE-2014-0004" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>pwieczorkiewicz</packager> <description> udisks was updated to fix a buffer overflow in mount path parsing. If users have the possibility to create very long mount points, such as with FUSE, they could cause udisksd to crash, or even to run arbitrary code as root with specially crafted mount paths. (bnc#865854, CVE-2014-0004) </description> <summary>udisks: fixed a buffer overflow</summary> </patchinfo> -- To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org For additional commands, e-mail: opensuse-commit+h...@opensuse.org