Update incident numbers
This commit is contained in:
parent
0b07ff6f9e
commit
27732e277e
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="144">
|
||||
<!-- generated from request(s) 346801 -->
|
||||
<issue tracker="bnc" id="1222040">VUL-0: CVE-2023-45913: Mesa: NULL pointer dereference via dri2GetGlxDrawableFromXDrawableId()</issue>
|
||||
<issue tracker="bnc" id="1222041">VUL-0: CVE-2023-45919: Mesa: buffer over-read in glXQueryServerString()</issue>
|
||||
@ -19,4 +19,4 @@
|
||||
<package>Mesa</package>
|
||||
<package>Mesa:drivers</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="145">
|
||||
<!-- generated from request(s) 339810 -->
|
||||
<issue tracker="bnc" id="1217538">[TRACKERBUG] Update region certs to accommodate 4096 length on GCE</issue>
|
||||
<packager>rjschwei</packager>
|
||||
@ -25,4 +25,4 @@
|
||||
</description>
|
||||
<package>regionServiceClientConfigGCE</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="146">
|
||||
<!-- generated from request(s) 350026 -->
|
||||
<issue tracker="bnc" id="1231698">VUL-0: CVE-2024-9676: buildah,podman,skopeo: github.com/containers/storage: symlink traversal vulnerability in the containers/storage library can cause Denial of Service (DoS)</issue>
|
||||
<issue tracker="cve" id="2024-9676"/>
|
||||
@ -12,4 +12,4 @@
|
||||
</description>
|
||||
<package>skopeo</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="147">
|
||||
<!-- generated from request(s) 344275 -->
|
||||
<issue tracker="bnc" id="1200528">VUL-0: CVE-2022-1996: go-restful: CORS bypass</issue>
|
||||
<issue tracker="bnc" id="1217070">VUL-0: CVE-2023-47108: TRACKERBUG: otelgrpc: DoS vulnerability in otelgrpc (uncontrolled resource consumption) due to unbound cardinality metrics</issue>
|
||||
@ -45,4 +45,4 @@
|
||||
</description>
|
||||
<package>containerd</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="148">
|
||||
<!-- generated from request(s) 337301 -->
|
||||
<issue tracker="bnc" id="1225879">VUL-0: CVE-2024-5197: libvpx: interger overflow when calling vpx_img_alloc() or vpx_img_wrap() with large parameters</issue>
|
||||
<issue tracker="cve" id="2024-5197"/>
|
||||
@ -12,4 +12,4 @@
|
||||
</description>
|
||||
<package>libvpx</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="149">
|
||||
<!-- generated from request(s) 349322 -->
|
||||
<issue tracker="bnc" id="1227181">open-vm-tools version 12.4.5 has been released - please rebase</issue>
|
||||
<issue tracker="bnc" id="1231826">open-vm-tools 12.5.0 was released - please rebase</issue>
|
||||
@ -50,4 +50,4 @@ Update to 12.4.5 (build 23787635) (bsc#1227181):
|
||||
</description>
|
||||
<package>open-vm-tools</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="150">
|
||||
<!-- generated from request(s) 349454 -->
|
||||
<issue tracker="bnc" id="1222806">VUL-0: CVE-2024-3772: python-pydantic: Regular expression denial of service in Pydantic < 2.4.0, < 1.10.13 allows remote attackers to cause denial of service via a crafted email string.</issue>
|
||||
<issue tracker="cve" id="2024-3772"/>
|
||||
@ -12,4 +12,4 @@
|
||||
</description>
|
||||
<package>python-pydantic</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="151">
|
||||
<!-- generated from request(s) 355431 -->
|
||||
<issue tracker="cve" id="2024-6156"/>
|
||||
<issue tracker="cve" id="2024-6219"/>
|
||||
@ -69,4 +69,4 @@
|
||||
</description>
|
||||
<package>govulncheck-vulndb</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="152">
|
||||
<!-- generated from request(s) 355546 -->
|
||||
<issue tracker="bnc" id="1233306">golang-oldstable version error when building helm</issue>
|
||||
<packager>jfkw</packager>
|
||||
@ -23,4 +23,4 @@
|
||||
</description>
|
||||
<package>go1.23-openssl</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="153">
|
||||
<!-- generated from request(s) 355545 -->
|
||||
<issue tracker="bnc" id="1233306">golang-oldstable version error when building helm</issue>
|
||||
<packager>jfkw</packager>
|
||||
@ -23,4 +23,4 @@
|
||||
</description>
|
||||
<package>go1.22-openssl</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="154">
|
||||
<!-- generated from request(s) 355435 -->
|
||||
<issue tracker="bnc" id="1233285">VUL-0: CVE-2024-52530: libsoup,libsoup2: HTTP request smuggling via stripping null bytes from the ends of header names</issue>
|
||||
<issue tracker="bnc" id="1233287">VUL-0: CVE-2024-52532: libsoup,libsoup2: libsoup: infinite loop while reading websocket data</issue>
|
||||
@ -18,4 +18,4 @@
|
||||
</description>
|
||||
<package>libsoup2</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
Loading…
x
Reference in New Issue
Block a user