Hello community, here is the log from the commit of package patchinfo.5127 for openSUSE:13.2:Update checked in at 2016-05-30 15:57:56 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5127 (Old) and /work/SRC/openSUSE:13.2:Update/.patchinfo.5127.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.5127" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="5127"> <issue id="954199" tracker="bnc">VUL-0: CVE-2015-8080: redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow</issue> <issue id="CVE-2015-8080" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>adamm</packager> <description> This update for redis fixes the following security issue: - CVE-2015-8080: Fixed an integer overflow resulting in stack-based overflow. (bsc#954199) </description> <summary>Security update for redis</summary> </patchinfo>