Hello community,

here is the log from the commit of package patchinfo.4007 for 
openSUSE:13.2:Update checked in at 2015-09-18 09:58:30
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.4007 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.4007.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.4007"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="4007">
  <issue id="927402" tracker="bnc">apache2 mod_nss: segfault 
libnssutil3.so(SECITEM_FreeItem_Util+0x21) free(): invalid next size</issue>
  <issue id="928039" tracker="bnc">apache2_mod_nss: default SSL host not 
working</issue>
  <issue id="930186" tracker="bnc">mod_nss SNI selection segfaults host</issue>
  <issue id="933832" tracker="bnc">Partner-L3: Using Mod_NSS in conjunction 
with Mod_Proxy doesn't send SNI in Client Hello to the Proxied Site</issue>
  <issue id="933265" tracker="bnc">apache2 mod_nss: segfault if certificate 
store is not readable</issue>
  <issue id="930922" tracker="bnc">Issue using mod_nss with hostnames of 
certain lengths</issue>
  <category>recommended</category>
  <rating>moderate</rating>
  <packager>vitezslav_cizek</packager>
  <description>
The Apache mod_nss module was updated to fix various issues.

* Unified the ciphers with SUSE Linux Enterprise 11.
* Send TLS server name extension (SNI) on proxy connections (bsc#933832)
* Various bugfixes for SNI support have been done (bnc#927402, bsc#927402, 
bsc#928039, bsc#930922, bsc#930186)
* Add an alert about permission on the certificate database (bsc#933265)
</description>
  <summary>Recommended update for apache2-mod_nss</summary>
</patchinfo>

Reply via email to