Update incident numbers

This commit is contained in:
Adrian Schröter 2025-01-20 08:09:54 +00:00 committed by gitea-actions-autobuild
parent f1f9dbc6c7
commit f8e8d42635
5 changed files with 10 additions and 10 deletions

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="191">
<!-- generated from request(s) 355680 -->
<issue tracker="bnc" id="1233785">VUL-0: CVE-2024-11498: libjxl: libjxl: Resource exhaustion via Stack overflow in libjxl</issue>
<issue tracker="cve" id="2024-11498"/>
@ -12,4 +12,4 @@
</description>
<package>libjxl</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="192">
<!-- generated from request(s) 341436 -->
<issue tracker="bnc" id="1223880">VUL-0: CVE-2024-34062: python-tqdm,python3-tqdm: CLI argument injection attack</issue>
<issue tracker="cve" id="2024-34062"/>
@ -13,4 +13,4 @@
<package>python-tqdm</package>
<package>python-tqdm:test</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="193">
<!-- generated from request(s) 341690 -->
<issue tracker="bnc" id="1229221">VUL-0: CVE-2024-42353: python-WebOb: WebOb provides objects for HTTP requests and responses. When WebOb normalizes the HTTP Location header to include the request hostname, it does so by parsing the URL that the user is to be redirected to with Pytho ...</issue>
<issue tracker="cve" id="2024-42353"/>
@ -12,4 +12,4 @@
</description>
<package>python-WebOb</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="194">
<!-- generated from request(s) 339642 -->
<issue tracker="bnc" id="1226134">VUL-0: CVE-2024-37535: vte: GNOME VTE before 0.76.3 allows an attacker to cause a denial of service (memory consumption) via a window resize escape sequence</issue>
<issue tracker="cve" id="2024-37535"/>
@ -12,4 +12,4 @@
</description>
<package>vte</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>

View File

@ -1,4 +1,4 @@
<patchinfo>
<patchinfo incident="195">
<!-- generated from request(s) 345591 -->
<issue tracker="bnc" id="1229951">VUL-0: CVE-2024-43806: python-maturin: rustix: rustix::fs::Dir iterator with the linux_raw backend can cause memory explosion</issue>
<issue tracker="bnc" id="1230027">VUL-0: python-maturin: rust-shlex: Multiple issues involving quote API ( RUSTSEC-2024-0006, GHSA-r7qv-8r2h-pg27)</issue>
@ -14,4 +14,4 @@
</description>
<package>python-maturin</package>
<seperate_build_arch/>
</patchinfo>
</patchinfo>