Update incident numbers

This commit is contained in:
Adrian Schröter 2024-11-29 12:05:29 +00:00 committed by github-actions[bot]
parent b1283df781
commit 8d68f9992c
15 changed files with 30 additions and 30 deletions

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="102">
<!-- generated from request(s) 343922 -->
<issue tracker="gh" id="psf/requests#6644"/>
<packager>dgarcia</packager>
@ -21,4 +21,4 @@
</description>
<package>python-httpretty</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="103">
<!-- generated from request(s) 332593 -->
<issue tracker="bnc" id="1223887">VUL-0: CVE-2024-34402: uriparser: integer overflow via long keys or values in ComposeQueryEngine() in UriQuery.c</issue>
<issue tracker="bnc" id="1223888">VUL-0: CVE-2024-34403: uriparser: integer overflow via a long string in ComposeQueryMallocExMm() in UriQuery.c</issue>
@ -17,4 +17,4 @@
</description>
<package>uriparser</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="104">
<!-- generated from request(s) 345438 -->
<issue tracker="bnc" id="1229783">VUL-0: CVE-2023-49582: apr,libapr1: unexpected lax shared memory permissions</issue>
<issue tracker="cve" id="2023-49582"/>
@ -12,4 +12,4 @@
</description>
<package>apr</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="105">
<!-- generated from request(s) 347794, 347795 -->
<issue tracker="bnc" id="1228199">VUL-0: CVE-2024-40724: libqt5-qtquick3d: assimp: heap-based buffer overflow in the PLY importer class</issue>
<issue tracker="bnc" id="1228204">VUL-0: CVE-2024-40724: libqt5-qt3d: assimp: heap-based buffer overflow in the PLY importer class</issue>
@ -18,4 +18,4 @@ libqt5-qtquick3d:
<package>libqt5-qt3d</package>
<package>libqt5-qtquick3d</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="106">
<!-- generated from request(s) 346792, 348628 -->
<issue tracker="bnc" id="1216320">[SLE15SP6] wayland-protocol test suite has one failing test on ppc64le</issue>
<packager>rfrohl</packager>
@ -17,4 +17,4 @@ wayland-protocols:
<package>flatpak</package>
<package>wayland-protocols</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="107">
<!-- generated from request(s) 352816 -->
<issue tracker="bnc" id="1225771">VUL-0: CVE-2024-5564: libndp: buffer overflow in route information length field</issue>
<issue tracker="cve" id="2024-5564"/>
@ -12,4 +12,4 @@
</description>
<package>libndp</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="108">
<!-- generated from request(s) 343438 -->
<issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
<issue tracker="bnc" id="1214718">The system hangs intermittently when Power Control Mode is set to Minimum Power on SLES15SP5 Xen.</issue>
@ -83,4 +83,4 @@
</description>
<package>xen</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="109">
<!-- generated from request(s) 354044 -->
<issue tracker="bnc" id="1233593">VUL-0: CVE-2024-11596: wireshark: Buffer Over-read in Wireshark</issue>
<issue tracker="bnc" id="1233594">VUL-0: CVE-2024-11595: wireshark: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark</issue>
@ -17,4 +17,4 @@ Wireshark 4.2.9:
</description>
<package>wireshark</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="110">
<!-- generated from request(s) 347958 -->
<issue tracker="bnc" id="1227546">VUL-0: CVE-2024-28882: openvpn: multiple exit notifications from authenticated clients will extend the validity of a closing session</issue>
<issue tracker="cve" id="2024-28882"/>
@ -12,4 +12,4 @@
</description>
<package>openvpn</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="111">
<!-- generated from request(s) 347693 -->
<issue tracker="bnc" id="1231264">VUL-0: CVE-2024-31449: redis,valkey,redict: Integer overflow bug in Lua bit_tohex</issue>
<issue tracker="bnc" id="1231265">VUL-0: CVE-2024-31228: redis,valkey,redict: Prevent unbounded recursive pattern matching</issue>
@ -18,4 +18,4 @@
</description>
<package>redis</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="112">
<!-- generated from request(s) 353708 -->
<issue tracker="bnc" id="1218424">go1.22 release tracking</issue>
<issue tracker="jsc" id="SLE-18320"/>
@ -18,4 +18,4 @@
</description>
<package>go1.22-openssl</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="113">
<!-- generated from request(s) 353944 -->
<issue tracker="cve" id="2020-8911"/>
<issue tracker="cve" id="2020-8912"/>
@ -44,4 +44,4 @@
</description>
<package>govulncheck-vulndb</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="114">
<!-- generated from request(s) 353934 -->
<packager>jfkw</packager>
<rating>moderate</rating>
@ -10,4 +10,4 @@
</description>
<package>vexctl</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="115">
<!-- generated from request(s) 345785 -->
<packager>adrianSuSE</packager>
<rating>moderate</rating>
@ -43,4 +43,4 @@
</description>
<package>product-composer</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="116">
<!-- generated from request(s) 339839 -->
<issue tracker="bnc" id="1228549">VUL-0: CVE-2024-41671: TRACKERBUG: python-Twisted,python3-Twisted: HTTP pipelined requests processed out of order in twisted.web</issue>
<issue tracker="bnc" id="1228552">VUL-0: CVE-2024-41810: python-Twisted,python3-Twisted: python-twisted: Reflected XSS via HTML Injection in Redirect Response</issue>
@ -16,4 +16,4 @@
<package>python-Twisted</package>
<package>python-Twisted:test</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>