Hello community, here is the log from the commit of package patchinfo.14292 for openSUSE:Leap:15.1:Update checked in at 2020-10-03 06:23:08 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Leap:15.1:Update/patchinfo.14292 (Old) and /work/SRC/openSUSE:Leap:15.1:Update/.patchinfo.14292.new.4249 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.14292" Sat Oct 3 06:23:08 2020 rev:1 rq:838630 version:unknown Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="14292"> <issue tracker="bnc" id="1176590">VUL-0: EMBARGOED: CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: dpdk: VM escape</issue> <issue tracker="cve" id="2020-14374"/> <issue tracker="cve" id="2020-14375"/> <issue tracker="cve" id="2020-14376"/> <issue tracker="cve" id="2020-14377"/> <issue tracker="cve" id="2020-14378"/> <packager>jaicaa</packager> <rating>critical</rating> <category>security</category> <summary>Security update for dpdk</summary> <description>This update for dpdk fixes the following issues: - dpdk was updated to 18.11.9. For a list of fixes check: - CVE-2020-14374,CVE-2020-14375,CVE-2020-14376,CVE-2020-14377,CVE-2020-14378: Fixed multiple issues where a malicious guest could harm the host using vhost crypto, including executing code in host (VM Escape), reading host application memory space to guest and causing partially denial of service in the host(bsc#1176590). For a list of fixes check: https://doc.dpdk.org/guides-18.11/rel_notes/release_18_11.html#fixes This update was imported from the SUSE:SLE-15-SP1:Update update project.</description> </patchinfo>