Hello community, here is the log from the commit of package patchinfo.12990 for openSUSE:Leap:15.1:Update checked in at 2020-06-29 20:20:24 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Leap:15.1:Update/patchinfo.12990 (Old) and /work/SRC/openSUSE:Leap:15.1:Update/.patchinfo.12990.new.3060 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.12990" Mon Jun 29 20:20:24 2020 rev:1 rq:817234 version:unknown Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="12990"> <issue tracker="cve" id="2019-18934"/> <issue tracker="cve" id="2020-12663"/> <issue tracker="cve" id="2020-12662"/> <issue tracker="bnc" id="1171889">VUL-0: CVE-2020-12662,CVE-2020-12663 : unbound: Vulnerabilities fixed in 1.10.1</issue> <issue tracker="bnc" id="1157268">VUL-0: CVE-2019-18934: unbound: Remote shell code execution in the IPSEC module</issue> <packager>rtorrero</packager> <rating>important</rating> <category>security</category> <summary>Security update for unbound</summary> <description>This update for unbound fixes the following issues: - CVE-2020-12662: Fixed an issue where unbound could have been tricked into amplifying an incoming query into a large number of queries directed to a target (bsc#1171889). - CVE-2020-12663: Fixed an issue where malformed answers from upstream name servers could have been used to make unbound unresponsive (bsc#1171889). - CVE-2019-18934: Fixed a vulnerability in the IPSec module which could have allowed code execution after receiving a special crafted answer (bsc#1157268). This update was imported from the SUSE:SLE-15-SP1:Update update project.</description> </patchinfo>