Hello community,

here is the log from the commit of package patchinfo.12885 for 
openSUSE:Leap:15.1:Update checked in at 2020-06-17 18:19:06
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Leap:15.1:Update/patchinfo.12885 (Old)
 and      /work/SRC/openSUSE:Leap:15.1:Update/.patchinfo.12885.new.3606 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "patchinfo.12885"

Wed Jun 17 18:19:06 2020 rev:1 rq:814099 version:unknown

Changes:
--------
New Changes file:

NO CHANGES FILE!!!

New:
----
  _patchinfo

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ _patchinfo ++++++
<patchinfo incident="12885">
  <issue tracker="bnc" id="1172265">VUL-0: EMBARGOED: 
CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9106,CVE-2017-9107,CVE-2017-9108,CVE-2017-9109:
 adns: multiple vulnerabilities</issue>
  <issue tracker="cve" id="2017-9104"/>
  <issue tracker="cve" id="2017-9105"/>
  <issue tracker="cve" id="2017-9106"/>
  <issue tracker="cve" id="2017-9107"/>
  <issue tracker="cve" id="2017-9103"/>
  <issue tracker="cve" id="2017-9108"/>
  <issue tracker="cve" id="2017-9109"/>
  <packager>kstreitova</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for adns</summary>
  <description>This update for adns fixes the following issues:

- CVE-2017-9103,CVE-2017-9104,CVE-2017-9105,CVE-2017-9109: Fixed an issue in 
local recursive resolver
  which could have led to remote code execution (bsc#1172265).
- CVE-2017-9106: Fixed an issue with upstream DNS data sources which could have 
led to denial of 
  service (bsc#1172265).
- CVE-2017-9107: Fixed an issue when quering domain names which could have led 
to denial of service (bsc#1172265).
- CVE-2017-9108: Fixed an issue which could have led to denial of service 
(bsc#1172265).

This update was imported from the SUSE:SLE-15:Update update 
project.</description>
</patchinfo>

Reply via email to