OK my first answer was bothering me. Looking at 2 other Macs running Catalina in this case, I counted the number of rows in tables and they were different but hardly by much.
With that in mind to be really cautious with what I'm saying, is that I did not rule out that issuer hashes of CAs and the serials of certs issued by them can't end up in this database for reasons other than updates from Apple directly.
For example when a user visits a certain site or runs a particular app, that might update this database also.
In that sense the data would be considered personal, just as much as the same type of data stored server side when such checks were made is personal and has caused Apple to say they'll take extra protections not to tie such data to users, IP addresses etc.
My observations of forcing an OCSP check for a cert through trustd have been that this database doesn't update but some cached info does (because apps start to run again) so that could just be because I'm not seeing a cache flush that should happen later but doesn't. I can't say if a theoretical cache flush on somebody else's machine would or wouldn't happen.
So a better answer would be:
Q: Im assuming there is no personal info stored in the db?
A: I don't think so but I haven't proven this definitively. If any personal data was in there it might be evaluations of use of certificates that are not normally in the updates from Apple. If somebody had a big database of issuer hashes and serials they could then perhaps match up things like which unusual (not in Apple updates) apps that were launched or sites visited perhaps. Only Apple themselves can answer this question definitively. Really they should be publishing detailed information of how this mechanism works for full transparency and increased user trust.
I still think the risk is low for anybody discovering personal information of the person donating a database since effort would be needed even if some of the information is personal it would be need to be matched up to other data to be meaningful.
I don't know if all certificate authorities publish lists of the serial numbers they've issued or not but they could probably be queried individually (my db's have only around 2K of serials in there), so gathering all the supplemental data might be hard too besides the tasks of matching it up with the donor database in the first place. Unless a donor is worried that they may have run a particular app or visited a particular site and that the recipient would have the means and knowhow, and motivation (blackmail?) to go to all the effort involved in finding something worthwhile to hold influence over the donor, then there is little to worry about.
To be super cautious, a person should never give other people data from their own computer that they don't fully understand first and never take data from anybody they don't trust or for which they don't understand the data content either. This statement is not indented as a criticism of any actions taken thus far in the thread as I believe sufficient understanding was in place for those sharing files or indeed downloading and using them.
Once again, making too definitive a statement is a common misstep so sorry about that. The answer is usually in grey area unfortunately and can often sound scary. This is why we all delegate this stuff to Apple and they're supposed to be sorting this out.
However we all take risks in life, and so hopefully this info will give people enough information to calculate what path they'd be comfortable with.