Hello community,

here is the log from the commit of package patchinfo.15211 for 
openSUSE:Leap:15.2:Update checked in at 2020-12-02 08:05:03
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.2:Update/patchinfo.15211 (Old)
 and      /work/SRC/openSUSE:Leap:15.2:Update/.patchinfo.15211.new.5913 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.15211"

Wed Dec  2 08:05:03 2020 rev:1 rq:852444 version:unknown

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="15211">
  <issue tracker="cve" id="2020-14360"/>
  <issue tracker="cve" id="2020-25712"/>
  <issue tracker="bnc" id="1177596">VUL-0: EMBARGOED: CVE-2020-25712: 
xorg-x11-server: XkbSetDeviceInfo Heap-based Buffer Overflow Privilege 
Escalation (ZDI-CAN-11839)</issue>
  <issue tracker="bnc" id="1174908">VUL-0: EMBARGOED: CVE-2020-14360: 
xorg-x11-server:  XkbSetMap Out-Of-Bounds Access Privilege Escalation 
Vulnerability (ZDI-CAN-11572)</issue>
  <packager>sndirsch</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for xorg-x11-server</summary>
  <description>This update for xorg-x11-server fixes the following issues:

- CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to 
privilege escalation (bsc#1177596).
- CVE-2020-14360: Fixed an out of bounds memory accesses on too short request 
which could lead to denial of service (bsc#1174908).

This update was imported from the SUSE:SLE-15-SP2:Update update 
project.</description>
</patchinfo>
_______________________________________________
openSUSE Commits mailing list -- [email protected]
To unsubscribe, email [email protected]
List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette
List Archives: 
https://lists.opensuse.org/archives/list/[email protected]

Reply via email to