Hello community, here is the log from the commit of package patchinfo.14248 for openSUSE:Leap:15.2:Update checked in at 2020-09-29 20:12:58 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Leap:15.2:Update/patchinfo.14248 (Old) and /work/SRC/openSUSE:Leap:15.2:Update/.patchinfo.14248.new.4249 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.14248" Tue Sep 29 20:12:58 2020 rev:1 rq:837923 version:unknown Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="14248"> <issue tracker="bnc" id="1175825">VUL-0: CVE-2020-8927: brotli: decoder: integer overflow when input chunk is larger than 2GiB</issue> <issue tracker="cve" id="2020-8927"></issue> <packager>AndreasStieger</packager> <rating>moderate</rating> <category>security</category> <summary>Security update for brotli</summary> <description>This update for brotli fixes the following issues: brotli was updated to 1.0.9: * CVE-2020-8927: Fix integer overflow when input chunk is longer than 2GiB [boo#1175825] * `brotli -v` now reports raw / compressed size * decoder: minor speed / memory usage improvements * encoder: fix rare access to uninitialized data in ring-buffer </description> </patchinfo>