Hello community,

here is the log from the commit of package patchinfo.5127 for 
openSUSE:13.2:Update checked in at 2016-05-30 15:57:56
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.5127 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.5127.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.5127"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="5127">
  <issue id="954199" tracker="bnc">VUL-0: CVE-2015-8080: redis: Integer 
wraparound in lua_struct.c causing stack-based buffer overflow</issue>
  <issue id="CVE-2015-8080" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>adamm</packager>
  <description>
This update for redis fixes the following security issue:

- CVE-2015-8080: Fixed an integer overflow resulting in stack-based overflow. 
(bsc#954199)
</description>
  <summary>Security update for redis</summary>
</patchinfo>

Reply via email to