commit patchinfo.5191 for openSUSE:13.2:Update

2016-06-15 Thread h_root
Hello community,

here is the log from the commit of package patchinfo.5191 for 
openSUSE:13.2:Update checked in at 2016-06-15 11:29:01

Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5191 (Old)
 and  /work/SRC/openSUSE:13.2:Update/.patchinfo.5191.new (New)


Package is "patchinfo.5191"

Changes:

New Changes file:

NO CHANGES FILE!!!

New:

  _patchinfo



Other differences:
--
++ _patchinfo ++

  recommended
  moderate
  simotek
  
This recommended update for xdg-utils fixes the following issues: 

- Fix issues related to xdg-open/xdg-mime generic code paths.

  Recommended update for xdg-utils




commit xdg-utils for openSUSE:13.2:Update

2016-06-15 Thread h_root
Hello community,

here is the log from the commit of package xdg-utils for openSUSE:13.2:Update 
checked in at 2016-06-15 11:28:57

Comparing /work/SRC/openSUSE:13.2:Update/xdg-utils (Old)
 and  /work/SRC/openSUSE:13.2:Update/.xdg-utils.new (New)


Package is "xdg-utils"

Changes:

New Changes file:

NO CHANGES FILE!!!



Other differences:
--
++ _link ++
--- /var/tmp/diff_new_pack.0egy0q/_old  2016-06-15 11:28:58.0 +0200
+++ /var/tmp/diff_new_pack.0egy0q/_new  2016-06-15 11:28:58.0 +0200
@@ -1 +1 @@
-
+




commit librtas for openSUSE:Factory

2016-06-15 Thread h_root
Hello community,

here is the log from the commit of package librtas for openSUSE:Factory checked 
in at 2016-06-15 09:26:05

Comparing /work/SRC/openSUSE:Factory/librtas (Old)
 and  /work/SRC/openSUSE:Factory/.librtas.new (New)


Package is "librtas"

Changes:

New Changes file:

--- /dev/null   2016-04-07 01:36:33.300037506 +0200
+++ /work/SRC/openSUSE:Factory/.librtas.new/librtas-doc.changes 2016-06-15 
09:26:06.0 +0200
@@ -0,0 +1,205 @@
+---
+Mon Jun 13 12:03:11 UTC 2016 - m...@suse.com
+
+- Split off documents to -doc sub-package
+  * We can't really add doxygen to Ring0 which required by -doc
+
+---
+Wed Mar  2 14:09:55 UTC 2016 - jloe...@suse.com
+
+- version update to 1.4.0 (FATE#319934)
+  - see Changelog under librtas-1.4.0/Changelog
+
+---
+Wed Oct 29 12:08:14 UTC 2014 - jloe...@suse.com
+
+- version update to 1.3.13
+  see changelog for changes  
+
+---
+Fri Sep  5 09:50:17 UTC 2014 - jeng...@inai.de
+
+- RPM group classification; add project web locations
+
+---
+Fri Sep  5 09:08:06 UTC 2014 - jloe...@suse.com
+
+- version update to 1.3.12 (BNC#894854)
+  - get_sensor, set_sensor: Handle big endian data in little endian
+  - fix for sc_platform_dump endian handling 
+
+---
+Thu Jul  3 14:31:24 CEST 2014 - p...@suse.de
+
+- Update to 1.3.11 (bnc#884710:
+  * README: documentation on handling endianness
+  * librtas: Little endian support in syscalls
+
+  See Changelog in the package documentation for the full changes
+  documentation.
+- Refresh librtas-failedmagic.patch.
+- Packege Changelog
+- No need to remove and create buildroot, that's done by osc.
+
+---
+Tue Mar 25 13:23:54 UTC 2014 - jloe...@suse.com
+
+- version update to 1.3.10 (BNC#870006)
+  see changelog for change
+
+---
+Tue Mar  4 14:57:14 UTC 2014 - jloe...@suse.com
+
+- change license to CPL-1.0 (see COPYRIGHT) 
+
+---
+Tue Mar  4 12:53:20 UTC 2014 - jloe...@suse.com
+
+- version update to 1.3.9 (BNC#866674) 
+  see changelog for changes 
+
+---
+Mon Dec  9 15:02:54 UTC 2013 - dval...@suse.com
+
+- enable ppc64le 
+
+---
+Sun Feb 24 16:27:48 UTC 2013 - dval...@suse.com
+
+- Update to 1.3.8
+  * Identify Platform Resource Reassignment Notifications (PRRN) 
+
+---
+Fri Dec 28 12:11:40 UTC 2012 - dval...@suse.com
+
+- update to 1.3.7
+   librtas allocates buffer space (required for RTAS call) in the 
+RTAS private memory area through sc_get_rmo_buffer() which 
+internally allocates memory and protects it by acquiring 
+lock on the allocated memory area.
+
+Locking function :
+ At present acquire_file_lock() tries to lock the particular 
+memory area. If the memory area is already locked then it 
+returns error without retrying.
+
+So when two process executes rtas call simultaneously one fails 
+with "Unknown librtas I/O" error.
+
+This patch introduces "Wait for lock to be available" instead 
+of returning with IO error.
+
+- fixed minor memory leak in librtas.so
+
+---
+Tue Jan 31 10:48:35 UTC 2012 - jeng...@medozas.de
+
+- Remove redundant tags/sections per specfile guideline suggestions
+- Parallel building using %_smp_mflags
+
+---
+Mon Nov 14 10:48:21 UTC 2011 - dval...@suse.com
+
+- update -> 1.3.6
+  - changes and small fixes in regards to lib64 support mostly
+- split up devel, doc packages
+- split librtas1 package according shared library policy
+- patch refresh
+- fix baselibs.conf
+- fix %files permission
+
+---
+Fri Nov 20 14:45:45 CET 2009 - u...@suse.de
+
+- update -> 1.3.4:
+  - new inventory model (fate#304149)
+  - support rtas event updates (fate#307049)
+
+---
+Wed Nov  5 16:47:14 CET 2008 - r...@suse.de
+
+- added baselibs.conf (bnc#434975) 
+
+---
+Tue Oct 28 08:45:39 CET 2008 - o...@suse.de
+
+- fix header 

commit ntp.5195 for openSUSE:13.2:Update

2016-06-15 Thread h_root
Hello community,

here is the log from the commit of package ntp.5195 for openSUSE:13.2:Update 
checked in at 2016-06-15 08:03:10

Comparing /work/SRC/openSUSE:13.2:Update/ntp.5195 (Old)
 and  /work/SRC/openSUSE:13.2:Update/.ntp.5195.new (New)


Package is "ntp.5195"

Changes:

New Changes file:

--- /dev/null   2016-04-07 01:36:33.300037506 +0200
+++ /work/SRC/openSUSE:13.2:Update/.ntp.5195.new/ntp.changes2016-06-15 
08:03:12.0 +0200
@@ -0,0 +1,1795 @@
+---
+Sun Jun  5 05:20:03 UTC 2016 - m...@suse.com
+
+- Keep the parent process alive until the daemon has finished
+  initialisation, to make sure that the PID file exists when the
+  parent returns (ntp-daemonize.patch).
+
+---
+Thu Jun  2 14:21:45 UTC 2016 - m...@suse.com
+
+- Update to 4.2.8p8 (bsc#982056):
+  * CVE-2016-4953, bsc#982065: Bad authentication demobilizes
+ephemeral associations.
+  * CVE-2016-4954, bsc#982066: Processing spoofed server packets.
+  * CVE-2016-4955, bsc#982067: Autokey association reset.
+  * CVE-2016-4956, bsc#982068: Broadcast interleave.
+  * CVE-2016-4957, bsc#982064: CRYPTO_NAK crash.
+- Change the process name of the forking DNS worker process to
+  avoid the impression that ntpd is started twice (bsc#979302).
+- Don't ignore SIGCHILD because it breaks wait() (boo#981422).
+- ntp-wait does not accept fractional seconds, so use 1 instead of
+  0.2 in ntp-wait.service (boo#979981).
+- Separate the creation of ntp.keys and key #1 in it to avoid
+  problems when upgrading installations that have the file, but
+  no key #1, which is needed e.g. by "rcntp addserver".
+
+---
+Thu Apr 28 13:10:01 UTC 2016 - m...@suse.com
+
+- Update to 4.2.8p7 (bsc#977446):
+  * CVE-2016-1547, bsc#977459:
+Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
+  * CVE-2016-1548, bsc#977461: Interleave-pivot
+  * CVE-2016-1549, bsc#977451:
+Sybil vulnerability: ephemeral association attack.
+  * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
+comparison timing attacks.
+  * CVE-2016-1551, bsc#977450:
+Refclock impersonation vulnerability
+  * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
+directives will cause an assertion botch in ntpd.
+  * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
+requestkey/controlkey values are not properly validated.
+  * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode > 7
+causes array wraparound with MATCH_ASSOC.
+  * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
+always checked.
+  * integrate ntp-fork.patch
+  * Improve the fixes for:
+CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
+- Restrict the parser in the startup script to the first
+  occurrance of "keys" and "controlkey" in ntp.conf (boo#957226).
+
+---
+Fri Apr 15 12:34:40 UTC 2016 - m...@suse.com
+
+- Enable compile-time support for MS-SNTP (--enable-ntp-signd).
+  This replaces the w32 patches in 4.2.4 that added the authreg
+  directive. (fate#320758).
+- Fix ntp-sntp-dst.patch (bsc#975496).
+- Call /usr/sbin/sntp with full path to synchronize in start-ntpd.
+  When run as cron job, /usr/sbin/ is not in the path, which caused
+  the synchronization to fail. (boo#962318)
+- Speedup ntpq (boo#782060, ntp-speedup-ntpq.patch).
+- Sync service files with openSUSE Factory.
+
+---
+Wed Mar 30 14:56:11 UTC 2016 - m...@suse.com
+
+- Fix the TZ offset output of sntp during DST (bsc#951559).
+
+---
+Fri Mar 18 13:51:13 UTC 2016 - m...@suse.com
+
+- Add ntp-fork.patch and build with threads disabled to allow
+  name resolution even when running chrooted.
+
+---
+Fri Jan 22 15:44:38 UTC 2016 - m...@suse.com
+
+- Update to 4.2.8p6:
+  * CVE-2015-8158, bsc#962966: Potential Infinite Loop in ntpq.
+  * CVE-2015-8138, bsc#963002: origin: Zero Origin Timestamp
+Bypass.
+  * CVE-2015-7979, bsc#962784: Off-path Denial of Service (DoS)
+attack on authenticated broadcast mode.
+  * CVE-2015-7978, bsc#963000: Stack exhaustion in recursive
+traversal of restriction list.
+  * CVE-2015-7977, bsc#962970: reslist NULL pointer dereference.
+  * CVE-2015-7976, bsc#962802: ntpq saveconfig command allows
+dangerous characters in filenames.
+  * CVE-2015-7975, bsc#962988: nextvar() missing length check.
+  * CVE-2015-7974, bsc#962960: Skeleton Key: Missing key check
+allows impersonation between authenticated peers.
+  * CVE-2015-7973, bsc#962995: Deja Vu: Replay attack on
+

commit ntp for openSUSE:13.2:Update

2016-06-15 Thread h_root
Hello community,

here is the log from the commit of package ntp for openSUSE:13.2:Update checked 
in at 2016-06-15 08:03:13

Comparing /work/SRC/openSUSE:13.2:Update/ntp (Old)
 and  /work/SRC/openSUSE:13.2:Update/.ntp.new (New)


Package is "ntp"

Changes:

New Changes file:

NO CHANGES FILE!!!



Other differences:
--
++ _link ++
--- /var/tmp/diff_new_pack.DIbM3B/_old  2016-06-15 08:03:15.0 +0200
+++ /var/tmp/diff_new_pack.DIbM3B/_new  2016-06-15 08:03:15.0 +0200
@@ -1 +1 @@
-
+