Update incident numbers

This commit is contained in:
Adrian Schröter 2024-11-11 09:00:57 +00:00 committed by github-actions[bot]
parent 62603d3698
commit 8acf797d30
15 changed files with 30 additions and 30 deletions

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="72">
<!-- generated from request(s) 341452 -->
<issue tracker="bnc" id="1228123">VUL-0: CVE-2024-41184: keepalived: integer overflow in vrrp_ipsets_handler</issue>
<issue tracker="cve" id="2024-41184"/>
@ -12,4 +12,4 @@
</description>
<package>keepalived</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="73">
<!-- generated from request(s) 343342 -->
<issue tracker="bnc" id="1200723">SLES15SP4: Splitter Disks are not showing up under /dev/ dir(nvme/splitter/sles15sp4/Denali/P10).</issue>
<issue tracker="bnc" id="1204968">VUL-0: CVE-2022-3821: systemd: buffer overrun in format_timespan() function.</issue>
@ -48,4 +48,4 @@
<package>systemd:mini</package>
<seperate_build_arch/>
<reboot_needed/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="74">
<!-- generated from request(s) 337124 -->
<issue tracker="bnc" id="1220770">VUL-0: CVE-2024-26458: krb5: memory leak at /krb5/src/lib/rpc/pmap_rmt.c</issue>
<issue tracker="bnc" id="1220771">VUL-0: CVE-2024-26461: krb5: memory leak at /krb5/src/lib/gssapi/krb5/k5sealv3.c</issue>
@ -25,4 +25,4 @@
<package>krb5</package>
<package>krb5:krb5-mini</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="75">
<!-- generated from request(s) 339641 -->
<issue tracker="bnc" id="1228120">VUL-0: CVE-2024-6655: gtk2,gtk3,gtk4: library injection from current working directory</issue>
<issue tracker="cve" id="2024-6655"/>
@ -12,4 +12,4 @@
</description>
<package>gtk3</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="76">
<!-- generated from request(s) 341211 -->
<issue tracker="bnc" id="1228105">VUL-0: CVE-2024-6345: python-setuptools: code execution via download functions in the package_index module in pypa/setuptools</issue>
<issue tracker="cve" id="2024-6345"/>
@ -14,4 +14,4 @@
<package>python-setuptools:test</package>
<package>python-setuptools:wheel</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="77">
<!-- generated from request(s) 345334 -->
<issue tracker="bnc" id="1215377">[Build 20230914-1] plugin /usr/sbin/sedispatch terminated unexpectedly</issue>
<packager>ematsumiya</packager>
@ -11,4 +11,4 @@
</description>
<package>audit</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="78">
<!-- generated from request(s) 345843 -->
<issue tracker="bnc" id="1215064">kernel-rt postinst script fails</issue>
<issue tracker="bnc" id="1221470">update-bootloader and pbl --install don't report install failure</issue>
@ -20,4 +20,4 @@
</description>
<package>perl-Bootloader</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="79">
<!-- generated from request(s) 332508 -->
<issue tracker="bnc" id="1225394">[SUSE:SLFO:Main] python-numba:test-py311 fails to build on ppc64le</issue>
<issue tracker="gh" id="numba/numba#8489"/>
@ -17,4 +17,4 @@
<package>python-numba:test-py311</package>
<package>python-numba:test-py39</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="80">
<!-- generated from request(s) 339648 -->
<issue tracker="bnc" id="1217536">[TRACKERBUG] Update region certs to accommodate 4096 length on EC2</issue>
<issue tracker="bnc" id="1218656">Update region certs to accommodate 4096 length on EC2</issue>
@ -35,4 +35,4 @@
</description>
<package>regionServiceClientConfigEC2</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="81">
<!-- generated with prepare-submission.rb from request 348533 -->
<issue id="1012628" tracker="bnc">Continuous stable update tracker for Tumbleweed</issue>
<issue id="1183045" tracker="bnc">mount command hangs on reserved scsi disk</issue>
@ -1165,4 +1165,4 @@ The following non-security bugs were fixed:
<package>kernel-default-base</package>
<package>kernel-livepatch-MICRO-6-0_Update_3</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="82">
<!-- generated from request(s) 348360, 348361, 348362, 348363, 348559 -->
<issue tracker="bnc" id="222971">Activate System fails</issue>
<issue tracker="bnc" id="1007273">[libsolv] yast removes empty lines from some EULAs</issue>
@ -273,4 +273,4 @@ zypper updated to 1.14.77:
<package>zypp-plugin</package>
<package>zypper</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="83">
<!-- generated from request(s) 339789 -->
<issue tracker="bnc" id="1167721">VUL-1: CVE-2019-20633: patch: double free vulnerability in the function another_hunk() via a crafted patch file</issue>
<issue tracker="cve" id="2019-20633"/>
@ -12,4 +12,4 @@
</description>
<package>patch</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="84">
<!-- generated with prepare-submission.rb from request 348650 -->
<issue id="1012628" tracker="bnc">Continuous stable update tracker for Tumbleweed</issue>
<issue id="1183045" tracker="bnc">mount command hangs on reserved scsi disk</issue>
@ -1177,4 +1177,4 @@ The following non-security bugs were fixed:
<package>kernel-source-rt:kernel-syms-rt</package>
<package>kernel-livepatch-MICRO-6-0-RT_Update_3</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="85">
<!-- generated from request(s) 349645, 349761, 349766 -->
<issue tracker="bnc" id="1212475">go1.21 release tracking</issue>
<issue tracker="bnc" id="1218424">go1.22 release tracking</issue>
@ -54,4 +54,4 @@ go1.23-openssl:
<package>go1.22-openssl</package>
<package>go1.23-openssl</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="86">
<!-- generated from request(s) 348658, 351130 -->
<issue tracker="jsc" id="PED-11136"/>
<packager>jfkw</packager>
@ -16,4 +16,4 @@ govulncheck-vulndb:
<package>govulncheck</package>
<package>govulncheck-vulndb</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>