Hello community, here is the log from the commit of package patchinfo.14051 for openSUSE:Leap:15.1:Update checked in at 2020-09-22 18:22:20 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Leap:15.1:Update/patchinfo.14051 (Old) and /work/SRC/openSUSE:Leap:15.1:Update/.patchinfo.14051.new.4249 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "patchinfo.14051" Tue Sep 22 18:22:20 2020 rev:1 rq:835564 version:unknown Changes: -------- New Changes file: NO CHANGES FILE!!! New: ---- _patchinfo ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ _patchinfo ++++++ <patchinfo incident="14051"> <issue tracker="bnc" id="1176412">VUL-0: CVE-2020-14392: perl-DBI: Memory corruption in XS functions when Perl stack is reallocated</issue> <issue tracker="bnc" id="1176409">VUL-0: CVE-2020-14393: perl-DBI: Buffer overflow on an overlong DBD class name</issue> <issue tracker="cve" id="2020-14392"/> <issue tracker="cve" id="2020-14393"/> <packager>pmonrealgonzalez</packager> <rating>important</rating> <category>security</category> <summary>Security update for perl-DBI</summary> <description>This update for perl-DBI fixes the following issues: Security issues fixed: - CVE-2020-14392: Memory corruption in XS functions when Perl stack is reallocated (bsc#1176412). - CVE-2020-14393: Fixed a buffer overflow on an overlong DBD class name (bsc#1176409). This update was imported from the SUSE:SLE-15:Update update project.</description> </patchinfo>