Hello community, here is the log from the commit of package patchinfo.15211 for openSUSE:Leap:15.2:Update checked in at 2020-12-02 08:05:03 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Leap:15.2:Update/patchinfo.15211 (Old) and /work/SRC/openSUSE:Leap:15.2:Update/.patchinfo.15211.new.5913 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.15211" Wed Dec 2 08:05:03 2020 rev:1 rq:852444 version:unknown Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="15211"> <issue tracker="cve" id="2020-14360"/> <issue tracker="cve" id="2020-25712"/> <issue tracker="bnc" id="1177596">VUL-0: EMBARGOED: CVE-2020-25712: xorg-x11-server: XkbSetDeviceInfo Heap-based Buffer Overflow Privilege Escalation (ZDI-CAN-11839)</issue> <issue tracker="bnc" id="1174908">VUL-0: EMBARGOED: CVE-2020-14360: xorg-x11-server: XkbSetMap Out-Of-Bounds Access Privilege Escalation Vulnerability (ZDI-CAN-11572)</issue> <packager>sndirsch</packager> <rating>important</rating> <category>security</category> <summary>Security update for xorg-x11-server</summary> <description>This update for xorg-x11-server fixes the following issues: - CVE-2020-25712: Fixed a heap-based buffer overflow which could have led to privilege escalation (bsc#1177596). - CVE-2020-14360: Fixed an out of bounds memory accesses on too short request which could lead to denial of service (bsc#1174908). This update was imported from the SUSE:SLE-15-SP2:Update update project.</description> </patchinfo> _______________________________________________ openSUSE Commits mailing list -- [email protected] To unsubscribe, email [email protected] List Netiquette: https://en.opensuse.org/openSUSE:Mailing_list_netiquette List Archives: https://lists.opensuse.org/archives/list/[email protected]
