Hello community, here is the log from the commit of package patchinfo.4007 for openSUSE:13.2:Update checked in at 2015-09-18 09:58:30 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:13.2:Update/patchinfo.4007 (Old) and /work/SRC/openSUSE:13.2:Update/.patchinfo.4007.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.4007" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="4007"> <issue id="927402" tracker="bnc">apache2 mod_nss: segfault libnssutil3.so(SECITEM_FreeItem_Util+0x21) free(): invalid next size</issue> <issue id="928039" tracker="bnc">apache2_mod_nss: default SSL host not working</issue> <issue id="930186" tracker="bnc">mod_nss SNI selection segfaults host</issue> <issue id="933832" tracker="bnc">Partner-L3: Using Mod_NSS in conjunction with Mod_Proxy doesn't send SNI in Client Hello to the Proxied Site</issue> <issue id="933265" tracker="bnc">apache2 mod_nss: segfault if certificate store is not readable</issue> <issue id="930922" tracker="bnc">Issue using mod_nss with hostnames of certain lengths</issue> <category>recommended</category> <rating>moderate</rating> <packager>vitezslav_cizek</packager> <description> The Apache mod_nss module was updated to fix various issues. * Unified the ciphers with SUSE Linux Enterprise 11. * Send TLS server name extension (SNI) on proxy connections (bsc#933832) * Various bugfixes for SNI support have been done (bnc#927402, bsc#927402, bsc#928039, bsc#930922, bsc#930186) * Add an alert about permission on the certificate database (bsc#933265) </description> <summary>Recommended update for apache2-mod_nss</summary> </patchinfo>