Update incident numbers

This commit is contained in:
Adrian Schröter 2024-11-15 12:31:08 +00:00 committed by github-actions[bot]
parent 86de2f4b02
commit 0b7e773729
15 changed files with 30 additions and 30 deletions

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="87">
<!-- generated from request(s) 345595 -->
<issue tracker="bnc" id="1229596">VUL-0: CVE-2024-7592: python, cpython: Uncontrolled CPU resource consumption when in http.cookies module</issue>
<issue tracker="bnc" id="1229704">VUL-0: CVE-2024-8088: python310,python311,python312,python39: denial of service in zipfile</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="88">
<!-- generated from request(s) 347580 -->
<issue tracker="bnc" id="1219041">SLE-Micro 5.5 Error message when starting venv-salt-minion: SELinux is preventing su from using the transition access on a process</issue>
<issue tracker="bnc" id="1220357">SLE Micro: Different behavior for Salt SSH minions when classic Salt or venv-salt-minion is already installed</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="89">
<!-- generated from request(s) 341694 -->
<issue tracker="bnc" id="1228924">VUL-0: CVE-2024-7006: tiff: NULL pointer dereference in tif_dirinfo.c</issue>
<issue tracker="cve" id="2024-7006"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="90">
<!-- generated from request(s) 348600 -->
<issue tracker="bnc" id="1231208">VUL-0: CVE-2024-9407: buildah: Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction</issue>
<issue tracker="bnc" id="1231230">VUL-0: CVE-2024-9341: buildah,podman: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="91">
<!-- generated from request(s) 348527 -->
<issue tracker="bnc" id="1230778">VUL-0: CVE-2024-7254: protobuf: StackOverflow vulnerability in Protocol Buffers</issue>
<issue tracker="cve" id="2024-7254"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="92">
<!-- generated from request(s) 333341 -->
<issue tracker="bnc" id="1224262">VUL-0: CVE-2024-26306: iperf: vulnerable to marvin attack if the authentication option is used</issue>
<issue tracker="cve" id="2024-26306"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="93">
<!-- generated from request(s) 348619 -->
<issue tracker="bnc" id="1224132">VUL-0: CVE-2024-4693: qemu: virtio-pci: improper release of configure vector leads to guest triggerable crash</issue>
<issue tracker="bnc" id="1229007">VUL-0: CVE-2024-7409: qemu: denial of service via improper synchronization in QEMU NBD Server during socket closure</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="94">
<!-- generated from request(s) 340906 -->
<issue tracker="bnc" id="1194818">Cursor can escape TTY login prompt</issue>
<packager>sbrabec</packager>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="95">
<!-- generated from request(s) 349275 -->
<issue tracker="bnc" id="1231208">VUL-0: CVE-2024-9407: buildah: Buildah: Podman: Improper Input Validation in bind-propagation Option of Dockerfile RUN --mount Instruction</issue>
<issue tracker="bnc" id="1231230">VUL-0: CVE-2024-9341: buildah,podman: cri-o: FIPS Crypto-Policy Directory Mounting Issue in containers/common Go Library</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="96">
<!-- generated from request(s) 348086, 347897, 347898, 347899, 347900, 347901, 347902, 347903, 347905, 347907, 349520, 349859 -->
<issue tracker="ijsc" id="MSQA-863"/>
<issue tracker="bnc" id="1219041">SLE-Micro 5.5 Error message when starting venv-salt-minion: SELinux is preventing su from using the transition access on a process</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="97">
<!-- generated from request(s) 338871, 336981, 335795 -->
<issue tracker="bnc" id="1225070">VUL-0: CVE-2024-36039: python-PyMySQL: SQL injection if used with untrusted JSON input</issue>
<issue tracker="bnc" id="1226660">VUL-0: CVE-2024-28397: python-Js2Py: an issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="98">
<!-- generated from request(s) 352876 -->
<issue tracker="bnc" id="1231476">VUL-0: CVE-2024-9781: wireshark: AppleTalk and RELOAD Framing dissector crash</issue>
<issue tracker="cve" id="2024-9781"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="99">
<!-- generated from request(s) 353182 -->
<issue tracker="cve" id="2024-10389"/>
<issue tracker="cve" id="2024-10975"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="100">
<!-- generated from request(s) 353049, 353050 -->
<issue tracker="bnc" id="1218424">go1.22 release tracking</issue>
<issue tracker="bnc" id="1229122">go1.23 release tracking</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="101">
<!-- generated from request(s) 353450 -->
<issue tracker="cve" id="2024-51744"/>
<issue tracker="jsc" id="PED-11136"/>