Hello community,

here is the log from the commit of package patchinfo.14248 for 
openSUSE:Leap:15.2:Update checked in at 2020-09-29 20:12:58
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.2:Update/patchinfo.14248 (Old)
 and      /work/SRC/openSUSE:Leap:15.2:Update/.patchinfo.14248.new.4249 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.14248"

Tue Sep 29 20:12:58 2020 rev:1 rq:837923 version:unknown

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="14248">
  <issue tracker="bnc" id="1175825">VUL-0: CVE-2020-8927: brotli: decoder: 
integer overflow when input chunk is larger than 2GiB</issue>
  <issue tracker="cve" id="2020-8927"></issue>
  <packager>AndreasStieger</packager>
  <rating>moderate</rating>
  <category>security</category>
  <summary>Security update for brotli</summary>
  <description>This update for brotli fixes the following issues:

brotli was updated to 1.0.9:

* CVE-2020-8927: Fix integer overflow when input chunk is longer than 2GiB 
[boo#1175825]
* `brotli -v` now reports raw / compressed size
* decoder: minor speed / memory usage improvements
* encoder: fix rare access to uninitialized data in ring-buffer
</description>
</patchinfo>

Reply via email to