Update incident numbers

This commit is contained in:
Adrian Schröter 2024-11-29 12:05:29 +00:00 committed by github-actions[bot]
parent b1283df781
commit 8d68f9992c
15 changed files with 30 additions and 30 deletions

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="102">
<!-- generated from request(s) 343922 -->
<issue tracker="gh" id="psf/requests#6644"/>
<packager>dgarcia</packager>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="103">
<!-- generated from request(s) 332593 -->
<issue tracker="bnc" id="1223887">VUL-0: CVE-2024-34402: uriparser: integer overflow via long keys or values in ComposeQueryEngine() in UriQuery.c</issue>
<issue tracker="bnc" id="1223888">VUL-0: CVE-2024-34403: uriparser: integer overflow via a long string in ComposeQueryMallocExMm() in UriQuery.c</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="104">
<!-- generated from request(s) 345438 -->
<issue tracker="bnc" id="1229783">VUL-0: CVE-2023-49582: apr,libapr1: unexpected lax shared memory permissions</issue>
<issue tracker="cve" id="2023-49582"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="105">
<!-- generated from request(s) 347794, 347795 -->
<issue tracker="bnc" id="1228199">VUL-0: CVE-2024-40724: libqt5-qtquick3d: assimp: heap-based buffer overflow in the PLY importer class</issue>
<issue tracker="bnc" id="1228204">VUL-0: CVE-2024-40724: libqt5-qt3d: assimp: heap-based buffer overflow in the PLY importer class</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="106">
<!-- generated from request(s) 346792, 348628 -->
<issue tracker="bnc" id="1216320">[SLE15SP6] wayland-protocol test suite has one failing test on ppc64le</issue>
<packager>rfrohl</packager>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="107">
<!-- generated from request(s) 352816 -->
<issue tracker="bnc" id="1225771">VUL-0: CVE-2024-5564: libndp: buffer overflow in route information length field</issue>
<issue tracker="cve" id="2024-5564"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="108">
<!-- generated from request(s) 343438 -->
<issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
<issue tracker="bnc" id="1214718">The system hangs intermittently when Power Control Mode is set to Minimum Power on SLES15SP5 Xen.</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="109">
<!-- generated from request(s) 354044 -->
<issue tracker="bnc" id="1233593">VUL-0: CVE-2024-11596: wireshark: Buffer Over-read in Wireshark</issue>
<issue tracker="bnc" id="1233594">VUL-0: CVE-2024-11595: wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="110">
<!-- generated from request(s) 347958 -->
<issue tracker="bnc" id="1227546">VUL-0: CVE-2024-28882: openvpn: multiple exit notifications from authenticated clients will extend the validity of a closing session</issue>
<issue tracker="cve" id="2024-28882"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="111">
<!-- generated from request(s) 347693 -->
<issue tracker="bnc" id="1231264">VUL-0: CVE-2024-31449: redis,valkey,redict: Integer overflow bug in Lua bit_tohex</issue>
<issue tracker="bnc" id="1231265">VUL-0: CVE-2024-31228: redis,valkey,redict: Prevent unbounded recursive pattern matching</issue>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="112">
<!-- generated from request(s) 353708 -->
<issue tracker="bnc" id="1218424">go1.22 release tracking</issue>
<issue tracker="jsc" id="SLE-18320"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="113">
<!-- generated from request(s) 353944 -->
<issue tracker="cve" id="2020-8911"/>
<issue tracker="cve" id="2020-8912"/>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="114">
<!-- generated from request(s) 353934 -->
<packager>jfkw</packager>
<rating>moderate</rating>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="115">
<!-- generated from request(s) 345785 -->
<packager>adrianSuSE</packager>
<rating>moderate</rating>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="116">
<!-- generated from request(s) 339839 -->
<issue tracker="bnc" id="1228549">VUL-0: CVE-2024-41671: TRACKERBUG: python-Twisted,python3-Twisted: HTTP pipelined requests processed out of order in twisted.web</issue>
<issue tracker="bnc" id="1228552">VUL-0: CVE-2024-41810: python-Twisted,python3-Twisted: python-twisted: Reflected XSS via HTML Injection in Redirect Response</issue>