Hello community,

here is the log from the commit of package patchinfo.2635 for 
openSUSE:13.1:Update checked in at 2014-03-18 09:02:50
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.1:Update/patchinfo.2635 (Old)
 and      /work/SRC/openSUSE:13.1:Update/.patchinfo.2635.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.2635"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo>
  <issue id="865854" tracker="bnc">VUL-0: CVE-2014-0004: udisks: udisks2: local 
code execution</issue>
  <issue id="CVE-2014-0004" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>pwieczorkiewicz</packager>
  <description>
udisks was updated to fix a buffer overflow in mount path parsing.

If users have the possibility to create very long mount points, such as with
FUSE, they could cause udisksd to crash, or even to run arbitrary
code as root with specially crafted mount paths.
(bnc#865854, CVE-2014-0004)
</description>
  <summary>udisks: fixed a buffer overflow</summary>
</patchinfo>
-- 
To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org
For additional commands, e-mail: opensuse-commit+h...@opensuse.org

Reply via email to