Hello community, here is the log from the commit of package patchinfo.1817 for openSUSE:12.3:Update checked in at 2013-07-04 11:00:40 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:12.3:Update/patchinfo.1817 (Old) and /work/SRC/openSUSE:12.3:Update/.patchinfo.1817.new (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Package is "patchinfo.1817" Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo> <issue id="825935" tracker="bnc">VUL-0: MozillaFirefox 22 security release</issue> <issue id="CVE-2013-1697" tracker="cve" /> <issue id="CVE-2013-1693" tracker="cve" /> <issue id="CVE-2013-1682" tracker="cve" /> <issue id="CVE-2013-1694" tracker="cve" /> <issue id="CVE-2013-1684" tracker="cve" /> <issue id="CVE-2013-1692" tracker="cve" /> <issue id="CVE-2013-1686" tracker="cve" /> <issue id="CVE-2013-1685" tracker="cve" /> <issue id="CVE-2013-1687" tracker="cve" /> <issue id="CVE-2013-1690" tracker="cve" /> <category>security</category> <rating>important</rating> <packager>wrosenauer</packager> <description>MozillaThunderbird was updated to Thunderbird 17.0.7 (bnc#825935) Security issues fixed: * MFSA 2013-49/CVE-2013-1682 Miscellaneous memory safety hazards * MFSA 2013-50/CVE-2013-1684/CVE-2013-1685/CVE-2013-1686 Memory corruption found using Address Sanitizer * MFSA 2013-51/CVE-2013-1687 (bmo#863933, bmo#866823) Privileged content access and execution via XBL * MFSA 2013-53/CVE-2013-1690 (bmo#857883) Execution of unmapped memory through onreadystatechange event * MFSA 2013-54/CVE-2013-1692 (bmo#866915) Data in the body of XHR HEAD requests leads to CSRF attacks * MFSA 2013-55/CVE-2013-1693 (bmo#711043) SVG filters can lead to information disclosure * MFSA 2013-56/CVE-2013-1694 (bmo#848535) PreserveWrapper has inconsistent behavior * MFSA 2013-59/CVE-2013-1697 (bmo#858101) XrayWrappers can be bypassed to run user defined methods in a privileged context </description> <summary>MozillaThunderbird: 17.0.7 security update</summary> </patchinfo> -- To unsubscribe, e-mail: opensuse-commit+unsubscribe@opensuse.org For additional commands, e-mail: opensuse-commit+help@opensuse.org