<issue tracker="bnc" id="1219041">SLE-Micro 5.5 Error message when starting venv-salt-minion: SELinux is preventing su from using the transition access on a process</issue>
<issue tracker="bnc" id="1220357">SLE Micro: Different behavior for Salt SSH minions when classic Salt or venv-salt-minion is already installed</issue>
<issue tracker="bnc" id="1222842">VUL-0: CVE-2024-3651: python-idna: python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()</issue>
<issue tracker="bnc" id="1226141">Image inspection fails on built container image with code 2</issue>
<issue tracker="bnc" id="1226447">VUL-0: CVE-2024-0397: python,python3,python310,python311,python312,python36,python39: memory race condition in ssl.SSLContext certificate store methods</issue>
<issue tracker="bnc" id="1226469">VUL-0: CVE-2024-37891: python-urllib3: proxy-authorization request header is not stripped during cross-origin redirects</issue>
<issue tracker="bnc" id="1227547">VUL-0: CVE-2024-5569: python-zipp: A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file that leads to an infinit ...</issue>
<issue tracker="bnc" id="1228105">VUL-0: CVE-2024-6345: python-setuptools: code execution via download functions in the package_index module in pypa/setuptools</issue>
<issue tracker="bnc" id="1228780">VUL-0: CVE-2024-6923: python,python3,python310,python311,python312,python36,python39: CPython : Email header injection due to unquoted newlines</issue>
<issue tracker="bnc" id="1229109">python3-salt is missing a 'def...' code for salt-cloud Window</issue>
<issue tracker="bnc" id="1229539">venv-salt-minion service fails to start on the minion</issue>
<issue tracker="bnc" id="1229654">VUL-0: CVE-2024-37891: venv-salt-minion: python-urllib3: proxy-authorization request header is not stripped during cross-origin redirects</issue>
<issue tracker="bnc" id="1229704">VUL-0: CVE-2024-8088: python310,python311,python312,python39: denial of service in zipfile</issue>
<issue tracker="bnc" id="1229873">PTF for python CVE-2024-7592</issue>
<issue tracker="bnc" id="1229994">VUL-0: CVE-2024-3651: venv-salt-minion: python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()</issue>
<issue tracker="bnc" id="1229995">VUL-0: CVE-2024-6345: venv-salt-minion: python-setuptools: code execution via download functions in the package_index module in pypa/setuptools</issue>
<issue tracker="bnc" id="1229996">VUL-0: CVE-2024-5569: venv-salt-minion: python-zipp: A Denial of Service (DoS) vulnerability exists in the jaraco/zipp library, affecting all versions prior to 3.19.1. The vulnerability is triggered when processing a specially crafted zip file</issue>
<issue tracker="bnc" id="1230058">VUL-0: CVE-2024-8088: venv-salt-minion: python310,python311,python312,python39: denial of service in zipfile</issue>
<issue tracker="bnc" id="1230059">VUL-0: CVE-2024-7592: venv-salt-minion: python, cpython: Uncontrolled CPU resource consumption when in http.cookies module</issue>
<issue tracker="bnc" id="1230322">Exceptions with salt reactor</issue>
<issue tracker="bnc" id="1231045">L3: System List screen status icon is not updating accurately if "reboot required" flag is present.</issue>