Update incident numbers
This commit is contained in:
parent
b1283df781
commit
8d68f9992c
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="102">
|
||||
<!-- generated from request(s) 343922 -->
|
||||
<issue tracker="gh" id="psf/requests#6644"/>
|
||||
<packager>dgarcia</packager>
|
||||
@ -21,4 +21,4 @@
|
||||
</description>
|
||||
<package>python-httpretty</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="103">
|
||||
<!-- generated from request(s) 332593 -->
|
||||
<issue tracker="bnc" id="1223887">VUL-0: CVE-2024-34402: uriparser: integer overflow via long keys or values in ComposeQueryEngine() in UriQuery.c</issue>
|
||||
<issue tracker="bnc" id="1223888">VUL-0: CVE-2024-34403: uriparser: integer overflow via a long string in ComposeQueryMallocExMm() in UriQuery.c</issue>
|
||||
@ -17,4 +17,4 @@
|
||||
</description>
|
||||
<package>uriparser</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="104">
|
||||
<!-- generated from request(s) 345438 -->
|
||||
<issue tracker="bnc" id="1229783">VUL-0: CVE-2023-49582: apr,libapr1: unexpected lax shared memory permissions</issue>
|
||||
<issue tracker="cve" id="2023-49582"/>
|
||||
@ -12,4 +12,4 @@
|
||||
</description>
|
||||
<package>apr</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="105">
|
||||
<!-- generated from request(s) 347794, 347795 -->
|
||||
<issue tracker="bnc" id="1228199">VUL-0: CVE-2024-40724: libqt5-qtquick3d: assimp: heap-based buffer overflow in the PLY importer class</issue>
|
||||
<issue tracker="bnc" id="1228204">VUL-0: CVE-2024-40724: libqt5-qt3d: assimp: heap-based buffer overflow in the PLY importer class</issue>
|
||||
@ -18,4 +18,4 @@ libqt5-qtquick3d:
|
||||
<package>libqt5-qt3d</package>
|
||||
<package>libqt5-qtquick3d</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="106">
|
||||
<!-- generated from request(s) 346792, 348628 -->
|
||||
<issue tracker="bnc" id="1216320">[SLE15SP6] wayland-protocol test suite has one failing test on ppc64le</issue>
|
||||
<packager>rfrohl</packager>
|
||||
@ -17,4 +17,4 @@ wayland-protocols:
|
||||
<package>flatpak</package>
|
||||
<package>wayland-protocols</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="107">
|
||||
<!-- generated from request(s) 352816 -->
|
||||
<issue tracker="bnc" id="1225771">VUL-0: CVE-2024-5564: libndp: buffer overflow in route information length field</issue>
|
||||
<issue tracker="cve" id="2024-5564"/>
|
||||
@ -12,4 +12,4 @@
|
||||
</description>
|
||||
<package>libndp</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="108">
|
||||
<!-- generated from request(s) 343438 -->
|
||||
<issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
|
||||
<issue tracker="bnc" id="1214718">The system hangs intermittently when Power Control Mode is set to Minimum Power on SLES15SP5 Xen.</issue>
|
||||
@ -83,4 +83,4 @@
|
||||
</description>
|
||||
<package>xen</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="109">
|
||||
<!-- generated from request(s) 354044 -->
|
||||
<issue tracker="bnc" id="1233593">VUL-0: CVE-2024-11596: wireshark: Buffer Over-read in Wireshark</issue>
|
||||
<issue tracker="bnc" id="1233594">VUL-0: CVE-2024-11595: wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark</issue>
|
||||
@ -17,4 +17,4 @@ Wireshark 4.2.9:
|
||||
</description>
|
||||
<package>wireshark</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="110">
|
||||
<!-- generated from request(s) 347958 -->
|
||||
<issue tracker="bnc" id="1227546">VUL-0: CVE-2024-28882: openvpn: multiple exit notifications from authenticated clients will extend the validity of a closing session</issue>
|
||||
<issue tracker="cve" id="2024-28882"/>
|
||||
@ -12,4 +12,4 @@
|
||||
</description>
|
||||
<package>openvpn</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="111">
|
||||
<!-- generated from request(s) 347693 -->
|
||||
<issue tracker="bnc" id="1231264">VUL-0: CVE-2024-31449: redis,valkey,redict: Integer overflow bug in Lua bit_tohex</issue>
|
||||
<issue tracker="bnc" id="1231265">VUL-0: CVE-2024-31228: redis,valkey,redict: Prevent unbounded recursive pattern matching</issue>
|
||||
@ -18,4 +18,4 @@
|
||||
</description>
|
||||
<package>redis</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="112">
|
||||
<!-- generated from request(s) 353708 -->
|
||||
<issue tracker="bnc" id="1218424">go1.22 release tracking</issue>
|
||||
<issue tracker="jsc" id="SLE-18320"/>
|
||||
@ -18,4 +18,4 @@
|
||||
</description>
|
||||
<package>go1.22-openssl</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="113">
|
||||
<!-- generated from request(s) 353944 -->
|
||||
<issue tracker="cve" id="2020-8911"/>
|
||||
<issue tracker="cve" id="2020-8912"/>
|
||||
@ -44,4 +44,4 @@
|
||||
</description>
|
||||
<package>govulncheck-vulndb</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="114">
|
||||
<!-- generated from request(s) 353934 -->
|
||||
<packager>jfkw</packager>
|
||||
<rating>moderate</rating>
|
||||
@ -10,4 +10,4 @@
|
||||
</description>
|
||||
<package>vexctl</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="115">
|
||||
<!-- generated from request(s) 345785 -->
|
||||
<packager>adrianSuSE</packager>
|
||||
<rating>moderate</rating>
|
||||
@ -43,4 +43,4 @@
|
||||
</description>
|
||||
<package>product-composer</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
@ -1,4 +1,4 @@
|
||||
<patchinfo>
|
||||
<patchinfo incident="116">
|
||||
<!-- generated from request(s) 339839 -->
|
||||
<issue tracker="bnc" id="1228549">VUL-0: CVE-2024-41671: TRACKERBUG: python-Twisted,python3-Twisted: HTTP pipelined requests processed out of order in twisted.web</issue>
|
||||
<issue tracker="bnc" id="1228552">VUL-0: CVE-2024-41810: python-Twisted,python3-Twisted: python-twisted: Reflected XSS via HTML Injection in Redirect Response</issue>
|
||||
@ -16,4 +16,4 @@
|
||||
<package>python-Twisted</package>
|
||||
<package>python-Twisted:test</package>
|
||||
<seperate_build_arch/>
|
||||
</patchinfo>
|
||||
</patchinfo>
|
Loading…
Reference in New Issue
Block a user