Hello community, here is the log from the commit of package patchinfo.1977 for openSUSE:12.2:Update checked in at 2013-09-13 09:22:43 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:12.2:Update/patchinfo.1977 (Old) and /work/SRC/openSUSE:12.2:Update/.patchinfo.1977.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.1977" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo> <issue id="794954" tracker="bnc">VUL-0: CVE-2012-5643: squid: DoS via invalid Content-Length headers or via memory leaks</issue> <issue id="796999" tracker="bnc" /> <issue id="677335" tracker="bnc">VUL-0: logrotate: issues with service owned directories</issue> <issue id="829084" tracker="bnc" /> <issue id="CVE-2013-0188" tracker="cve" /> <issue id="CVE-2013-4115" tracker="cve" /> <issue id="CVE-2012-5643" tracker="cve" /> <issue id="CVE-2013-0189" tracker="cve" /> <category>security</category> <rating>moderate</rating> <packager>draht</packager> <description>This squid update includes several security fixes and minor changes. - squid-2.7.x-bnc829084-CVE-2013-4115-BO_request_handling.diff Squid advisory SQUID-2013_2, CVE-2013-4115, [bnc#829084] Specially crafted http requests can trigger a buffer overflow when squid attempts to resolve an overly long hostname. - squid-2.7.x-bnc796999-bnc794954-CVE-2012-5643-CVE-2013-0188-cachemgr_cgi_dos.diff memory leak in cachemgr.cgi known as CVE-2013-0189, which is the underfixed CVE-2012-5643 problem. [bnc#796999] [bnc#794954] - run logrotate as squid:nogroup [bnc#677335] </description> <summary>update for squid</summary> </patchinfo> -- To unsubscribe, e-mail: opensuse-commit+unsubscr...@opensuse.org For additional commands, e-mail: opensuse-commit+h...@opensuse.org