Hello community,

here is the log from the commit of package patchinfo.12990 for 
openSUSE:Leap:15.1:Update checked in at 2020-06-29 20:20:24
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.1:Update/patchinfo.12990 (Old)
 and      /work/SRC/openSUSE:Leap:15.1:Update/.patchinfo.12990.new.3060 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.12990"

Mon Jun 29 20:20:24 2020 rev:1 rq:817234 version:unknown

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="12990">
  <issue tracker="cve" id="2019-18934"/>
  <issue tracker="cve" id="2020-12663"/>
  <issue tracker="cve" id="2020-12662"/>
  <issue tracker="bnc" id="1171889">VUL-0: CVE-2020-12662,CVE-2020-12663 : 
unbound: Vulnerabilities fixed in 1.10.1</issue>
  <issue tracker="bnc" id="1157268">VUL-0: CVE-2019-18934: unbound: Remote 
shell code execution in the IPSEC module</issue>
  <packager>rtorrero</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for unbound</summary>
  <description>This update for unbound fixes the following issues:

- CVE-2020-12662: Fixed an issue where unbound could have been tricked into 
amplifying 
  an incoming query into a large number of queries directed to a target 
(bsc#1171889).
- CVE-2020-12663: Fixed an issue where malformed answers from upstream name 
servers 
  could have been used to make unbound unresponsive (bsc#1171889).        
- CVE-2019-18934: Fixed a vulnerability in the IPSec module which could have 
allowed 
  code execution after receiving a special crafted answer (bsc#1157268).

This update was imported from the SUSE:SLE-15-SP1:Update update 
project.</description>
</patchinfo>

Reply via email to