Hello community,

here is the log from the commit of package patchinfo.3753 for 
openSUSE:13.2:Update checked in at 2016-11-15 14:43:10
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.3753 (Old)
 and      /work/SRC/openSUSE:13.2:Update/.patchinfo.3753.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.3753"

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="3753">
  <issue id="972127" tracker="bnc">[TRACKERBUG] FATE#320298: [ECO] Update pcre 
from 8.33 to 8.37 and follow the stable version in the future</issue>
  <issue id="957566" tracker="bnc">VUL-0: CVE-2015-8380: pcre: heap overflow in 
pcre_exec</issue>
  <issue id="971741" tracker="bnc">VUL-1: CVE-2016-3191: pcre: workspace 
overflow for (*ACCEPT) with deeply nested parentheses (8.39/13, 
10.22/12)</issue>
  <issue id="942865" tracker="bnc">VUL-0: pcre: heap overflow in 
compile_regex()</issue>
  <issue id="960837" tracker="bnc">VUL-0: CVE-2016-1283: pcre: Heap buffer 
overflow in pcre_compile2 causes DoS</issue>
  <issue id="936227" tracker="bnc">VUL-1: CVE-2015-5073: pcre:  Library Heap 
Overflow Vulnerability in find_fixedlength()</issue>
  <issue id="933288" tracker="bnc">VUL-1: CVE-2015-3210 pcre: heap buffer 
overflow in pcre_compile2() / compile_regex()</issue>
  <issue id="957598" tracker="bnc">VUL-0: pcre: various security issues fixed 
in pcre 8.37 and 8.38 release</issue>
  <issue id="933878" tracker="bnc">VUL-1: CVE-2015-3217: pcre: PCRE Library 
Call Stack Overflow Vulnerability in match()</issue>
  <issue id="2015-5073" tracker="cve" />
  <issue id="2015-3217" tracker="cve" />
  <issue id="2015-3210" tracker="cve" />
  <issue id="2016-3191" tracker="cve" />
  <issue id="2015-8380" tracker="cve" />
  <issue id="2016-1283" tracker="cve" />
  <category>security</category>
  <rating>moderate</rating>
  <packager>AndreasStieger</packager>
  <description>This version fixes a number of vulnerabilities that affect pcre
and applications using the libary when accepting untrusted input
as regular expressions or as part thereof. Remote attackers could
have caused the application to crash, disclose information or
potentially execute arbitrary code.

- Update to PCRE 8.39 FATE#320298 boo#972127.
- CVE-2015-3210: heap buffer overflow in pcre_compile2() / compile_regex() 
(boo#933288)
- CVE-2015-3217: pcre: PCRE Library Call Stack Overflow Vulnerability in 
match() (boo#933878)
- CVE-2015-5073: pcre: Library Heap Overflow Vulnerability in 
find_fixedlength() (boo#936227)
- boo#942865: heap overflow in compile_regex()
- CVE-2015-8380: pcre: heap overflow in pcre_exec (boo#957566)
- boo#957598: various security issues fixed in pcre 8.37 and 8.38 release
- CVE-2016-1283: pcre: Heap buffer overflow in pcre_compile2 causes DoS 
(boo#960837)
- CVE-2016-3191: pcre: workspace overflow for (*ACCEPT) with deeply nested 
parentheses (boo#971741)
</description>
  <summary>Security update for pcre</summary>
</patchinfo>

Reply via email to