Hello community,

here is the log from the commit of package patchinfo.13321 for 
openSUSE:Leap:15.2:Update checked in at 2020-07-19 20:25:49
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.2:Update/patchinfo.13321 (Old)
 and      /work/SRC/openSUSE:Leap:15.2:Update/.patchinfo.13321.new.3592 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.13321"

Sun Jul 19 20:25:49 2020 rev:1 rq:821337 version:unknown

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="13321">
  <issue tracker="bnc" id="1169978">Partner-L3: google-compute-engine-* package 
update fails (need "systemctl try-restart" in postinstall?)</issue>
  <issue tracker="bnc" id="1173258">VUL-0: 
CVE-2020-8903,CVE-2020-8907,CVE-2020-8933: privilege escalation in 
guest-oslogin</issue>
  <issue tracker="cve" id="2020-8933"/>
  <issue tracker="cve" id="2020-8903"/>
  <issue tracker="cve" id="2020-8907"/>
  <packager>glaubitz</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for google-compute-engine</summary>
  <description>This update for google-compute-engine fixes the following issues:

- Don't enable and start google-network-daemon.service when it's
  already installed (bsc#1169978)

  + Do not add the created user to the adm (CVE-2020-8903),
    docker (CVE-2020-8907), or lxd (CVE-2020-8933) groups
    if they exist (bsc#1173258)</description>
</patchinfo>

Reply via email to