Salvatore Bonaccorso pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
964f262f by security tracker role at 2025-02-13T08:12:10+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,223 @@
+CVE-2025-25286 (Crayfish is a collection of Islandora 8 microservices, one of
which, H ...)
+ TODO: check
+CVE-2025-20097 (Uncaught exception in OpenBMC Firmware for the Intel(R) Server
M50FCP ...)
+ TODO: check
+CVE-2025-1229 (A vulnerability classified as critical was found in olajowon
Loggrove ...)
+ TODO: check
+CVE-2025-1228 (A vulnerability classified as problematic has been found in
olajowon L ...)
+ TODO: check
+CVE-2025-1227 (A vulnerability was found in ywoa up to 2024.07.03. It has been
rated ...)
+ TODO: check
+CVE-2025-1226 (A vulnerability was found in ywoa up to 2024.07.03. It has been
declar ...)
+ TODO: check
+CVE-2025-1198 (An issue discovered in GitLab CE/EE affecting all versions from
16.11 ...)
+ TODO: check
+CVE-2025-1070 (CWE-434: Unrestricted Upload of File with Dangerous Type
vulnerability ...)
+ TODO: check
+CVE-2025-1060 (CWE-319: Cleartext Transmission of Sensitive Information
vulnerability ...)
+ TODO: check
+CVE-2025-1059 (CWE-770: Allocation of Resources Without Limits or Throttling
vulnerab ...)
+ TODO: check
+CVE-2025-1058 (CWE-494: Download of Code Without Integrity Check vulnerability
exists ...)
+ TODO: check
+CVE-2025-0896 (Orthanc server prior to version 1.5.8 does not enable basic
authentica ...)
+ TODO: check
+CVE-2025-0837 (The Puzzles theme for WordPress is vulnerable to Stored
Cross-Site Scr ...)
+ TODO: check
+CVE-2025-0816 (CWE-20: Improper Input Validation vulnerability exists that
could caus ...)
+ TODO: check
+CVE-2025-0815 (CWE-20: Improper Input Validation vulnerability exists that
could caus ...)
+ TODO: check
+CVE-2025-0814 (CWE-20: Improper Input Validation vulnerability exists that
could caus ...)
+ TODO: check
+CVE-2025-0692 (The Simple Video Management System WordPress plugin through
1.0.4 does ...)
+ TODO: check
+CVE-2025-0661 (The DethemeKit For Elementor plugin for WordPress is vulnerable
to Inf ...)
+ TODO: check
+CVE-2025-0327 (CWE-269: Improper Privilege Management vulnerability exists for
two se ...)
+ TODO: check
+CVE-2025-0113 (A problem with the network isolation mechanism of the Palo Alto
Networ ...)
+ TODO: check
+CVE-2025-0111 (An authenticated file read vulnerability in the Palo Alto
Networks PAN ...)
+ TODO: check
+CVE-2025-0110 (A command injection vulnerability in the Palo Alto Networks
PAN-OS Ope ...)
+ TODO: check
+CVE-2025-0109 (An unauthenticated file deletion vulnerability in the Palo Alto
Networ ...)
+ TODO: check
+CVE-2025-0108 (An authentication bypass in the Palo Alto Networks PAN-OS
software ena ...)
+ TODO: check
+CVE-2024-8266 (An issue was discovered in GitLab CE/EE affecting all versions
startin ...)
+ TODO: check
+CVE-2024-7102 (An issue was discovered in GitLab CE/EE affecting all versions
startin ...)
+ TODO: check
+CVE-2024-57605 (Cross Site Scripting vulnerability in Daylight Studio Fuel CMS
v.1.5.2 ...)
+ TODO: check
+CVE-2024-57604 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote
attacker to e ...)
+ TODO: check
+CVE-2024-57603 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote
attacker to e ...)
+ TODO: check
+CVE-2024-57602 (An issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a
remote a ...)
+ TODO: check
+CVE-2024-57601 (Cross Site Scripting vulnerability in Alex Tselegidis
EasyAppointments ...)
+ TODO: check
+CVE-2024-56940 (An issue in the profile image upload function of LearnDash
v6.7.1 allo ...)
+ TODO: check
+CVE-2024-56939 (LearnDash v6.7.1 was discovered to contain a stored cross-site
scripti ...)
+ TODO: check
+CVE-2024-56938 (LearnDash v6.7.1 was discovered to contain a stored cross-site
scripti ...)
+ TODO: check
+CVE-2024-51440 (An issue in Nothing Tech Nothing OS v.2.6 allows a local
attacker to e ...)
+ TODO: check
+CVE-2024-51376 (Directory Traversal vulnerability in yeqifu carRental v.1.0
allows a r ...)
+ TODO: check
+CVE-2024-51123 (An issue in Zertificon Z1 SecureMail Z1 SecureMail Gateway
4.44.2-7240 ...)
+ TODO: check
+CVE-2024-51122 (Cross Site Scripting vulnerability in Zertificon Z1 SecureMail
Z1 Cert ...)
+ TODO: check
+CVE-2024-47266 (Improper limitation of a pathname to a restricted directory
('Path Tra ...)
+ TODO: check
+CVE-2024-47265 (Improper limitation of a pathname to a restricted directory
('Path Tra ...)
+ TODO: check
+CVE-2024-47264 (Improper limitation of a pathname to a restricted directory
('Path Tra ...)
+ TODO: check
+CVE-2024-47006 (Uncontrolled search path for the Intel(R) RealSense D400
Series Univer ...)
+ TODO: check
+CVE-2024-46923 (An issue was discovered in Samsung Mobile Processor Exynos
2200, 1480, ...)
+ TODO: check
+CVE-2024-46922 (An issue was discovered in Samsung Mobile Processor Exynos
1480 and 24 ...)
+ TODO: check
+CVE-2024-42492 (Uncontrolled search path element in some BIOS and System
Firmware Upda ...)
+ TODO: check
+CVE-2024-42419 (Incorrect default permissions for some Intel(R) GPA and
Intel(R) GPA F ...)
+ TODO: check
+CVE-2024-42410 (Improper input validation in some Intel(R) Graphics Drivers
may allow ...)
+ TODO: check
+CVE-2024-42405 (Uncontrolled search path for some Intel(R) Quartus(R) Prime
Software b ...)
+ TODO: check
+CVE-2024-41934 (Improper access control in some Intel(R) GPA software before
version 2 ...)
+ TODO: check
+CVE-2024-41917 (Time-of-check time-of-use race condition for some Intel(R)
Battery Lif ...)
+ TODO: check
+CVE-2024-41168 (Use after free in some Intel(R) PROSet/Wireless WiFi and
Killer\xe2\u2 ...)
+ TODO: check
+CVE-2024-41166 (Stack-based buffer overflow in some Intel(R) PROSet/Wireless
WiFi and ...)
+ TODO: check
+CVE-2024-40887 (Race condition in some Intel(R) PROSet/Wireless WiFi and
Killer\xe2\u2 ...)
+ TODO: check
+CVE-2024-39813 (Uncontrolled search path for some EPCT software before version
1.42.8. ...)
+ TODO: check
+CVE-2024-39805 (Insufficient verification of data authenticity in some
Intel(R) DSA so ...)
+ TODO: check
+CVE-2024-39797 (Improper access control in some drivers for Intel(R) Ethernet
Connecti ...)
+ TODO: check
+CVE-2024-39779 (Stack-based buffer overflow in some drivers for Intel(R)
Ethernet Conn ...)
+ TODO: check
+CVE-2024-39606 (Improper input validation in some Intel(R) PROSet/Wireless
WiFi and Ki ...)
+ TODO: check
+CVE-2024-39372 (Uncontrolled search path for the Intel(R) XTU software for
Windows bef ...)
+ TODO: check
+CVE-2024-39365 (Uncontrolled search path for the FPGA Support Package for the
Intel(R) ...)
+ TODO: check
+CVE-2024-39356 (NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi
and Kil ...)
+ TODO: check
+CVE-2024-39286 (Incorrect execution-assigned permissions in the Linux kernel
mode driv ...)
+ TODO: check
+CVE-2024-39284 (Uncontrolled search path for some Intel(R) Advisor software
before ver ...)
+ TODO: check
+CVE-2024-39271 (Improper restriction of communication channel to intended
endpoints in ...)
+ TODO: check
+CVE-2024-38310 (Improper access control in some Intel(R) Graphics Driver
software inst ...)
+ TODO: check
+CVE-2024-38307 (Improper input validation in the firmware for some Intel(R)
AMT and In ...)
+ TODO: check
+CVE-2024-37355 (Improper access control in some Intel(R) Graphics software may
allow a ...)
+ TODO: check
+CVE-2024-36291 (Uncontrolled search path for some Intel(R) Chipset Software
Installati ...)
+ TODO: check
+CVE-2024-36285 (Race condition in some Intel(R) PROSet/Wireless WiFi and
Killer\xe2\u2 ...)
+ TODO: check
+CVE-2024-36283 (Uncontrolled search path for the Intel(R) Thread Director
Visualizer s ...)
+ TODO: check
+CVE-2024-36280 (Uncontrolled search path for some Intel(R) High Level
Synthesis Compil ...)
+ TODO: check
+CVE-2024-36274 (Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver
for Int ...)
+ TODO: check
+CVE-2024-36262 (Race condition in some Intel(R) System Security Report and
System Reso ...)
+ TODO: check
+CVE-2024-34521 (A directory traversal vulnerability exists in the Mavenir SCE
Applicat ...)
+ TODO: check
+CVE-2024-34520 (An authorization bypass vulnerability exists in the Mavenir
SCE Applic ...)
+ TODO: check
+CVE-2024-32942 (Incorrect default permissions for some Intel(R) DSA installer
for Wind ...)
+ TODO: check
+CVE-2024-32941 (NULL pointer dereference for some Intel(R) MLC software before
version ...)
+ TODO: check
+CVE-2024-32938 (Uncontrolled search path for some Intel(R) MPI Library for
Windows sof ...)
+ TODO: check
+CVE-2024-31858 (Out-of-bounds write for some Intel(R) QuickAssist Technology
software ...)
+ TODO: check
+CVE-2024-31155 (Improper buffer restrictions in the UEFI firmware for some
Intel(R) Pr ...)
+ TODO: check
+CVE-2024-31153 (Improper input validation for some Intel(R) QuickAssist
Technology sof ...)
+ TODO: check
+CVE-2024-30211 (Improper access control in some Intel(R) ME driver pack
installer engi ...)
+ TODO: check
+CVE-2024-29223 (Uncontrolled search path for some Intel(R) QuickAssist
Technology soft ...)
+ TODO: check
+CVE-2024-26021 (Improper initialization in the firmware for some Intel(R) AMT
and Inte ...)
+ TODO: check
+CVE-2024-25571 (Improper input validation in some Intel(R) SPS firmware before
SPS_E5_ ...)
+ TODO: check
+CVE-2024-24852 (Uncontrolled search path in some Intel(R) Ethernet Adapter
Complete Dr ...)
+ TODO: check
+CVE-2024-21859 (Improper buffer restrictions in the UEFI firmware for some
Intel(R) Pr ...)
+ TODO: check
+CVE-2024-21830 (Uncontrolled search path in some Intel(R) VPL software before
version ...)
+ TODO: check
+CVE-2024-13770 (The Puzzles | WP Magazine / Review with Store WordPress Theme
+ RTL th ...)
+ TODO: check
+CVE-2024-13644 (The DethemeKit For Elementor plugin for WordPress is
vulnerable to Sto ...)
+ TODO: check
+CVE-2024-13346 (The Avada | Website Builder For WordPress & WooCommerce theme
for Word ...)
+ TODO: check
+CVE-2024-13345 (The Avada Builder plugin for WordPress is vulnerable to
arbitrary shor ...)
+ TODO: check
+CVE-2024-13229 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings
plugin ...)
+ TODO: check
+CVE-2024-13227 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings
plugin ...)
+ TODO: check
+CVE-2024-13125 (The Everest Forms WordPress plugin before 3.0.8.1 does not
sanitise a ...)
+ TODO: check
+CVE-2024-13121 (The Paid Membership Plugin, Ecommerce, User Registration Form,
Login F ...)
+ TODO: check
+CVE-2024-13120 (The Paid Membership Plugin, Ecommerce, User Registration Form,
Login F ...)
+ TODO: check
+CVE-2024-13119 (The Paid Membership Plugin, Ecommerce, User Registration Form,
Login F ...)
+ TODO: check
+CVE-2024-12673 (An improper privilege vulnerability was reported in a BIOS
customizati ...)
+ TODO: check
+CVE-2024-12586 (The Chalet-Montagne.com Tools WordPress plugin through 2.7.8
does not ...)
+ TODO: check
+CVE-2024-10763 (The Campress theme for WordPress is vulnerable to Local File
Inclusion ...)
+ TODO: check
+CVE-2024-10083 (CWE-20: Improper Input Validation vulnerability exists that
could caus ...)
+ TODO: check
+CVE-2023-49618 (Improper buffer restrictions in some Intel(R) System Security
Report a ...)
+ TODO: check
+CVE-2023-49615 (Improper input validation in some Intel(R) System Security
Report and ...)
+ TODO: check
+CVE-2023-49603 (Race condition in some Intel(R) System Security Report and
System Reso ...)
+ TODO: check
+CVE-2023-48366 (Race condition in some Intel(R) System Security Report and
System Reso ...)
+ TODO: check
+CVE-2023-48267 (Improper buffer restrictions in some Intel(R) System Security
Report a ...)
+ TODO: check
+CVE-2023-32277 (Untrusted Pointer Dereference in I/O subsystem for some
Intel(R) QAT s ...)
+ TODO: check
+CVE-2023-31276 (Heap-based buffer overflow in BMC Firmware for the Intel(R)
Server Boa ...)
+ TODO: check
+CVE-2023-29164 (Improper access control in BMC Firmware for the Intel(R)
Server Board ...)
+ TODO: check
CVE-2025-1247
NOT-FOR-US: Quarkus
CVE-2025-26378 (A CWE-862 "Missing Authorization" in
maxprofile/users/routes.lua in Q- ...)
@@ -294,62 +514,62 @@ CVE-2024-57951 (In the Linux kernel, the following
vulnerability has been resolv
NOTE:
https://git.kernel.org/linus/2f8dea1692eef2b7ba6a256246ed82c365fdc686 (6.13)
CVE-2025-26467
- cassandra <itp> (bug #585905)
-CVE-2024-31068
+CVE-2024-31068 (Improper Finite State Machines (FSMs) in Hardware Logic for
some Intel ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-36293
+CVE-2024-36293 (Improper access control in the EDECCSSA user leaf function for
some In ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28047
+CVE-2024-28047 (Improper input validation in UEFI firmware for some Intel(R)
Processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-31157
+CVE-2024-31157 (Improper initialization in UEFI firmware OutOfBandXML module
in some I ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39279
+CVE-2024-39279 (Insufficient granularity of access control in UEFI firmware in
some In ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28127
+CVE-2024-28127 (Improper input validation in UEFI firmware for some Intel(R)
Processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-29214
+CVE-2024-29214 (Improper input validation in UEFI firmware
CseVariableStorageSmm for s ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-24582
+CVE-2024-24582 (Improper input validation in XmlCli feature for UEFI firmware
for some ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-34440
+CVE-2023-34440 (Improper input validation in UEFI firmware for some Intel(R)
Processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-43758
+CVE-2023-43758 (Improper input validation in UEFI firmware for some Intel(R)
processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39355
+CVE-2024-39355 (Improper handling of physical or environmental conditions in
some Inte ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
NOTE:
https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-37020
+CVE-2024-37020 (Sequence of processor instructions leads to unexpected
behavior in the ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for
unstable exposure, can be fixed via point release)
NOTE:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
@@ -396,9 +616,9 @@ CVE-2024-33469 (An issue in Team Amaze Amaze File Manager
v.3.8.5 and fixed in v
NOT-FOR-US: Team Amaze Amaze File Manager
CVE-2024-32037 (GeoNetwork is a catalog application to manage spatially
referenced res ...)
NOT-FOR-US: GeoNetwork
-CVE-2024-29172 (Dell BSAFE SSL-J contains a deadlock vulnerability. A remote
attacker ...)
+CVE-2024-29172 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0
through 7.2, ...)
NOT-FOR-US: Dell
-CVE-2024-29171 (Dell BSAFE SSL-J contains an Improper certificate verification
vulnera ...)
+CVE-2024-29171 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0
through 7.2, ...)
NOT-FOR-US: Dell
CVE-2024-21971 (Improper input validation in AMD Crash Defender could allow an
attacke ...)
NOT-FOR-US: AMD
@@ -3953,7 +4173,7 @@ CVE-2025-24166
CVE-2025-24163 (The issue was addressed with improved checks. This issue is
fixed in i ...)
NOT-FOR-US: Apple
CVE-2025-24162 (This issue was addressed through improved state management.
This issue ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security
support in Bookworm)
@@ -3966,7 +4186,7 @@ CVE-2025-24160 (The issue was addressed with improved
checks. This issue is fixe
CVE-2025-24159 (A validation issue was addressed with improved logic. This
issue is fi ...)
NOT-FOR-US: Apple
CVE-2025-24158 (The issue was addressed with improved memory handling. This
issue is f ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security
support in Bookworm)
@@ -3983,7 +4203,7 @@ CVE-2025-24152 (The issue was addressed with improved
memory handling. This issu
CVE-2025-24151 (The issue was addressed with improved memory handling. This
issue is f ...)
NOT-FOR-US: Apple
CVE-2025-24150 (A privacy issue was addressed with improved handling of files.
This is ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security
support in Bookworm)
@@ -3996,7 +4216,7 @@ CVE-2025-24146 (This issue was addressed with improved
redaction of sensitive in
CVE-2025-24145 (A privacy issue was addressed with improved private data
redaction for ...)
NOT-FOR-US: Apple
CVE-2025-24143 (The issue was addressed with improved access restrictions to
the file ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security
support in Bookworm)
@@ -228095,8 +228315,7 @@ CVE-2022-31633
RESERVED
CVE-2022-31632
RESERVED
-CVE-2022-31631
- RESERVED
+CVE-2022-31631 (In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15,
8.2.* before ...)
{DSA-5363-1 DLA-3345-1}
- php8.2 8.2.1-1
- php8.1 <removed>
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits