Abhijith PA pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
0e2edf5f by Abhijith PA at 2022-09-05T08:52:16+05:30
Reserve DLA-3099-1 for qemu

- - - - -


3 changed files:

- data/CVE/list
- data/DLA/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -36969,7 +36969,6 @@ CVE-2022-26355 (Citrix Federated Authentication Service 
(FAS) 7.17 - 10.6 causes
 CVE-2022-26354 (A flaw was found in the vhost-vsock device of QEMU. In case of 
error,  ...)
        {DSA-5133-1 DLA-2970-1}
        - qemu 1:7.0+dfsg-1
-       [buster] - qemu <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2063257
        NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/8d1b247f3748ac4078524130c6d7ae42b6140aaf
        NOTE: vulnerable code in buster in vhost_vsock_send_transport_reset
@@ -60930,7 +60929,6 @@ CVE-2021-3930 (An off-by-one error was found in the 
SCSI device emulation in QEM
        {DLA-2970-1}
        - qemu 1:6.2+dfsg-1
        [bullseye] - qemu <postponed> (Minor issue)
-       [buster] - qemu <postponed> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=2020588
        NOTE: https://gitlab.com/qemu-project/qemu/-/issues/546
        NOTE: Fixed by: 
https://gitlab.com/qemu-project/qemu/-/commit/b3af7fdf9cc537f8f0dd3e2423d83f5c99a457e8
 (v6.2.0-rc0)
@@ -73898,7 +73896,6 @@ CVE-2021-39231 (In Apache Ozone versions prior to 
1.2.0, Various internal server
 CVE-2021-3713 (An out-of-bounds write flaw was found in the UAS (USB Attached 
SCSI) d ...)
        {DSA-4980-1 DLA-2753-1}
        - qemu 1:6.1+dfsg-2 (bug #992727)
-       [buster] - qemu <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1994640
        NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/13b250b12ad3c59114a6a17d59caf073ce45b33a
 CVE-2021-39230 (Butter is a system usability utility. Due to a kernel error 
the JPNS k ...)
@@ -84736,13 +84733,11 @@ CVE-2021-34827 (This vulnerability allows 
network-adjacent attackers to execute
        NOT-FOR-US: D-Link
 CVE-2021-3608 (A flaw was found in the QEMU implementation of VMWare's 
paravirtual RD ...)
        - qemu 1:5.2+dfsg-11 (bug #990563)
-       [buster] - qemu <no-dsa> (Minor issue)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1973383
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=66ae37d8cc313f89272e711174a846a229bcdbd3
 CVE-2021-3607 (An integer overflow was found in the QEMU implementation of 
VMWare's p ...)
        - qemu 1:5.2+dfsg-11 (bug #990564)
-       [buster] - qemu <no-dsa> (Minor issue)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1973349
        NOTE: upstream commit: 
https://git.qemu.org/?p=qemu.git;a=commit;h=32e5703cfea07c91e6e84bcb0313f633bb146534
@@ -86893,7 +86888,6 @@ CVE-2021-3587
        REJECTED
 CVE-2021-3582 (A flaw was found in the QEMU implementation of VMWare's 
paravirtual RD ...)
        - qemu 1:5.2+dfsg-11 (bug #990565)
-       [buster] - qemu <no-dsa> (Minor issue)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-06/msg04148.html
        NOTE: Upstream commit: 
https://git.qemu.org/?p=qemu.git;a=commit;h=284f191b4abad213aed04cb0458e1600fd18d7c4
@@ -92138,7 +92132,6 @@ CVE-2021-3528 (A flaw was found in noobaa-operator in 
versions before 5.7.0, whe
 CVE-2021-3527 (A flaw was found in the USB redirector device (usb-redir) of 
QEMU. Sma ...)
        {DLA-2753-1}
        - qemu 1:5.2+dfsg-11 (bug #988157)
-       [buster] - qemu <no-dsa> (Minor issue)
        NOTE: Initial patchset: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg00564.html
        NOTE: Revisited: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01372.html
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2021-05/msg01373.html
@@ -93339,7 +93332,6 @@ CVE-2021-3508 (A flaw was found in PDFResurrect in 
version 0.22b. There is an in
 CVE-2021-3507 (A heap buffer overflow was found in the floppy disk emulator of 
QEMU u ...)
        - qemu <unfixed> (bug #987410)
        [bullseye] - qemu <no-dsa> (Minor issue)
-       [buster] - qemu <no-dsa> (Minor issue)
        [stretch] - qemu <no-dsa> (Minor issue)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1951118
        NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/defac5e2fbddf8423a354ff0454283a2115e1367
@@ -103199,7 +103191,6 @@ CVE-2021-3417 (An internal product security audit of 
LXCO, prior to version 1.2.
 CVE-2021-3416 (A potential stack overflow via infinite loop issue was found in 
variou ...)
        {DLA-2623-1}
        - qemu 1:5.2+dfsg-9 (bug #984448)
-       [buster] - qemu <postponed> (Minor issue)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07431.html
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg07484.html
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=e73adfbeec9d4e008630c814759052ed945c3fed
@@ -105881,7 +105872,6 @@ CVE-2021-3393 (An information leak was discovered in 
postgresql in versions befo
 CVE-2021-3392 (A use-after-free flaw was found in the MegaRAID emulator of 
QEMU. This ...)
        {DLA-2623-1}
        - qemu 1:5.2+dfsg-10 (bug #984449)
-       [buster] - qemu <postponed> (Minor issue)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg00488.html
        NOTE: https://bugs.launchpad.net/qemu/+bug/1914236
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=3791642c8d60029adf9b00bcb4e34d7d8a1aea4d
@@ -122917,7 +122907,6 @@ CVE-2021-20257 (An infinite loop flaw was found in 
the e1000 NIC emulator of the
        {DLA-2623-1}
        - qemu 1:5.2+dfsg-9 (bug #984450)
        [bullseye] - qemu <postponed> (Minor issue)
-       [buster] - qemu <postponed> (Minor issue)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg03595.html
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=3de46e6fc489c52c9431a8a832ad8170a7569bd8
 CVE-2021-20256 (A flaw was found in Red Hat Satellite. The BMC interface 
exposes the p ...)
@@ -123112,7 +123101,6 @@ CVE-2021-20222 (A flaw was found in keycloak. The new 
account console in keycloa
 CVE-2021-20221 (An out-of-bounds heap buffer access issue was found in the ARM 
Generic ...)
        {DLA-2560-1}
        - qemu 1:5.2+dfsg-4
-       [buster] - qemu <postponed> (Minor issue)
        NOTE: https://www.openwall.com/lists/oss-security/2021/02/05/1
        NOTE: 
https://gitlab.com/qemu-project/qemu/-/commit/edfe2eb4360cde4ed5d95bda7777edcb3510f76a
 (v6.0.0-rc0)
 CVE-2021-20220 (A flaw was found in Undertow. A regression in the fix for 
CVE-2020-106 ...)
@@ -123211,7 +123199,6 @@ CVE-2021-20203 (An integer overflow issue was found 
in the vmxnet3 NIC emulator
        {DLA-2623-1}
        - qemu 1:6.2+dfsg-1 (bug #984452)
        [bullseye] - qemu <postponed> (Minor issue)
-       [buster] - qemu <postponed> (Minor issue)
        NOTE: https://bugs.launchpad.net/qemu/+bug/1913873
        NOTE: https://gitlab.com/qemu-project/qemu/-/issues/308
        NOTE: https://bugs.launchpad.net/qemu/+bug/1890152
@@ -123252,7 +123239,6 @@ CVE-2021-20196 (A NULL pointer dereference flaw was 
found in the floppy disk emu
        {DLA-2970-1}
        - qemu 1:6.2+dfsg-1 (bug #984453)
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
-       [buster] - qemu <postponed> (Fix along in future DSA)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1919210
        NOTE: https://bugs.launchpad.net/qemu/+bug/1912780
        NOTE: https://gitlab.com/qemu-project/qemu/-/issues/338
@@ -123312,7 +123298,6 @@ CVE-2021-20182 (A privilege escalation flaw was found 
in openshift4/ose-docker-b
 CVE-2021-20181 (A race condition flaw was found in the 9pfs server 
implementation of Q ...)
        {DLA-2560-1}
        - qemu 1:5.2+dfsg-4
-       [buster] - qemu <postponed> (Minor issue)
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=89fbea8737e8f7b954745a1ffc4238d377055305
 CVE-2021-20180 (A flaw was found in ansible module where credentials are 
disclosed in  ...)
        - ansible 5.4.0-1 (bug #985753)
@@ -123733,7 +123718,6 @@ CVE-2020-35505 (A NULL pointer dereference flaw was 
found in the am53c974 SCSI h
        [experimental] - qemu 1:6.0+dfsg-1~exp0
        - qemu 1:6.0+dfsg-3 (bug #984455)
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
-       [buster] - qemu <postponed> (Fix along in future DSA)
        [stretch] - qemu <postponed> (Fix along in future DLA)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1909769
        NOTE: https://bugs.launchpad.net/qemu/+bug/1910723 (reproducer)
@@ -123752,7 +123736,6 @@ CVE-2020-35504 (A NULL pointer dereference flaw was 
found in the SCSI emulation
        [experimental] - qemu 1:6.0+dfsg-1~exp0
        - qemu 1:6.0+dfsg-3 (bug #979679)
        [bullseye] - qemu <postponed> (Minor issue, revisit when fixed upstream)
-       [buster] - qemu <postponed> (Fix along in future DSA)
        [stretch] - qemu <postponed> (Fix along in future DLA)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1909766
        NOTE: https://bugs.launchpad.net/qemu/+bug/1910723 (reproducer)
@@ -127315,7 +127298,6 @@ CVE-2020-29444 (Affected versions of Team Calendar in 
Confluence Server before 7
 CVE-2020-29443 (ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows 
out-of- ...)
        {DLA-2560-1}
        - qemu 1:5.2+dfsg-11 (bug #983575)
-       [buster] - qemu <postponed> (Fix along in future DSA)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-01/msg04255.html
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=813212288970c39b1800f63e83ac6e96588095c6
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=b8d7f1bc59276fec85e4d09f1567613a3e14d31e
@@ -128014,7 +127996,6 @@ CVE-2020-29130 (slirp.c in libslirp through 4.3.1 has 
a buffer over-read because
 CVE-2020-29129 (ncsi.c in libslirp through 4.3.1 has a buffer over-read 
because it tri ...)
        - libslirp 4.4.0-1
        - qemu 1:4.1-2
-       [buster] - qemu <postponed> (Fix along in future DSA)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: 
https://gitlab.freedesktop.org/slirp/libslirp/-/commit/2e1dcbc0c2af64fcb17009eaf2ceedd81be2b27f
 (v4.4.0)
        NOTE: qemu 1:4.1-2 switched to system libslirp, marking that version as 
fixed.
@@ -128557,7 +128538,6 @@ CVE-2020-28917 (An issue was discovered in the 
view_statistics (aka View fronten
 CVE-2020-28916 (hw/net/e1000e_core.c in QEMU 5.0.0 has an infinite loop via an 
RX desc ...)
        {DLA-2560-1}
        - qemu 1:5.2+dfsg-1 (bug #976388; bug #974687)
-       [buster] - qemu <postponed> (Fix along in future DSA)
        NOTE: https://www.openwall.com/lists/oss-security/2020/12/01/2
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg03185.html
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1893895 (duplicate)
@@ -134202,7 +134182,6 @@ CVE-2020-27822 (A flaw was found in Wildfly affecting 
versions 19.0.0.Final, 19.
        - wildfly <itp> (bug #752018)
 CVE-2020-27821 (A flaw was found in the memory management API of QEMU during 
the initi ...)
        - qemu 1:5.2+dfsg-3 (bug #977616)
-       [buster] - qemu <postponed> (Fix along in future update)
        [stretch] - qemu <not-affected> (Vulnerable code introduced later)
        NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1902651
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=4bfb024bc76973d40a359476dc0291f46e435442
@@ -135362,7 +135341,6 @@ CVE-2020-27618 (The iconv function in the GNU C 
Library (aka glibc or libc6) 2.3
 CVE-2020-27617 (eth_get_gso_type in net/eth.c in QEMU 4.2.1 allows guest OS 
users to t ...)
        {DLA-2469-1}
        - qemu 1:5.2+dfsg-1 (bug #973324)
-       [buster] - qemu <postponed> (Fix along in future DSA)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg06023.html
        NOTE: Fixed by: 
https://git.qemu.org/?p=qemu.git;a=commit;h=7564bf7701f00214cdc8a678a9f7df765244def1
 (v5.2.0-rc2)
 CVE-2020-27616 (ati_2d_blt in hw/display/ati_2d.c in QEMU 4.2.1 can encounter 
an outsi ...)
@@ -139824,7 +139802,6 @@ CVE-2020-25724 (A flaw was found in RESTEasy, where 
an incorrect response to an
 CVE-2020-25723 (A reachable assertion issue was found in the USB EHCI 
emulation code o ...)
        {DLA-2469-1}
        - qemu 1:5.2+dfsg-1 (bug #975276)
-       [buster] - qemu <postponed> (Fix along in future DSA)
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=2fdb42d840400d58f2e706ecca82c142b97bcbd6
 (v5.2.0-rc0)
 CVE-2020-25722 (Multiple flaws were found in the way samba AD DC implemented 
access an ...)
        {DSA-5003-1}
@@ -140299,14 +140276,12 @@ CVE-2020-25626 (A flaw was found in Django REST 
Framework versions before 3.12.0
 CVE-2020-25625 (hw/usb/hcd-ohci.c in QEMU 5.0.0 has an infinite loop when a TD 
list ha ...)
        {DLA-2469-1}
        - qemu 1:5.2+dfsg-1 (bug #970542)
-       [buster] - qemu <postponed> (Can be fixed along in next qemu DSA)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05905.html
        NOTE: https://www.openwall.com/lists/oss-security/2020/09/17/1
        NOTE: Fixed by: 
https://git.qemu.org/?p=qemu.git;a=commit;h=1be90ebecc95b09a2ee5af3f60c412b45a766c4f
 (v5.2.0-rc0)
 CVE-2020-25624 (hw/usb/hcd-ohci.c in QEMU 5.0.0 has a stack-based buffer 
over-read via ...)
        {DLA-2469-1}
        - qemu 1:5.2+dfsg-1 (bug #970541)
-       [buster] - qemu <postponed> (Can be fixed along in next qemu DSA)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05492.html
        NOTE: Fixed by: 
https://git.qemu.org/?p=qemu.git;a=commit;h=1328fe0c32d5474604105b8105310e944976b058
 (v5.2.0-rc0)
 CVE-2020-25623 (Erlang/OTP 22.3.x before 22.3.4.6 and 23.x before 23.1 allows 
Director ...)
@@ -141553,7 +141528,6 @@ CVE-2021-3409 (The patch for 
CVE-2020-17380/CVE-2020-25085 was found to be ineff
 CVE-2020-25085 (QEMU 5.0.0 has a heap-based Buffer Overflow in 
flatview_read_continue  ...)
        {DLA-2469-1}
        - qemu 1:5.2+dfsg-1 (bug #970540)
-       [buster] - qemu <postponed> (Can be fixed along in next qemu DSA)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg00733.html
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg01439.html
        NOTE: https://www.openwall.com/lists/oss-security/2020/09/16/6
@@ -141565,7 +141539,6 @@ CVE-2020-25085 (QEMU 5.0.0 has a heap-based Buffer 
Overflow in flatview_read_con
 CVE-2020-25084 (QEMU 5.0.0 has a use-after-free in hw/usb/hcd-xhci.c because 
the usb_p ...)
        {DLA-2560-1}
        - qemu 1:5.2+dfsg-1 (bug #970539)
-       [buster] - qemu <postponed> (Can be fixed along in next qemu DSA)
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-08/msg08050.html
        NOTE: 
https://lists.nongnu.org/archive/html/qemu-devel/2020-08/msg08043.html
        NOTE: https://www.openwall.com/lists/oss-security/2020/09/16/5
@@ -161671,7 +161644,6 @@ CVE-2020-15860 (Parallels Remote Application Server 
(RAS) 17.1.1 has a Business
 CVE-2020-15859 (QEMU 4.2.0 has a use-after-free in hw/net/e1000e_core.c 
because a gues ...)
        {DLA-2560-1}
        - qemu 1:5.2+dfsg-1 (bug #965978)
-       [buster] - qemu <postponed> (Minor issue, can be fixed along in next 
DSA)
        NOTE: Proposed patch: 
https://lists.gnu.org/archive/html/qemu-devel/2020-07/msg05895.html
        NOTE: https://bugs.launchpad.net/qemu/+bug/1886362
        NOTE: 
https://git.qemu.org/?p=qemu.git;a=commit;h=22dc8663d9fc7baa22100544c600b6285a63c7a3
@@ -162792,7 +162764,6 @@ CVE-2020-15469 (In QEMU 4.2.0, a MemoryRegionOps 
object may lack read/write call
        {DLA-2560-1}
        - qemu 1:6.0+dfsg-3 (low; bug #970253)
        [bullseye] - qemu <ignored> (Minor issue, too intrusive to backport)
-       [buster] - qemu <ignored> (Minor issue, too intrusive to backport)
        NOTE: https://www.openwall.com/lists/oss-security/2020/07/02/1
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2020-06/msg09961.html
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2021-02/msg00674.html
@@ -168979,7 +168950,6 @@ CVE-2020-13254 (An issue was discovered in Django 2.2 
before 2.2.13 and 3.0 befo
 CVE-2020-13253 (sd_wp_addr in hw/sd/sd.c in QEMU 4.2.0 uses an unvalidated 
address, wh ...)
        {DLA-2373-1}
        - qemu 1:5.0-8 (bug #961297)
-       [buster] - qemu <postponed> (Minor issue, revisit when fixed upstream)
        NOTE: 
https://lists.gnu.org/archive/html/qemu-devel/2020-05/msg05835.html
        NOTE: https://www.openwall.com/lists/oss-security/2020/05/27/2
        NOTE: https://bugs.launchpad.net/qemu/+bug/1880822 (reproducer)


=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[05 Sep 2022] DLA-3099-1 qemu - security update
+       {CVE-2020-13253 CVE-2020-15469 CVE-2020-15859 CVE-2020-25084 
CVE-2020-25085 CVE-2020-25624 CVE-2020-25625 CVE-2020-25723 CVE-2020-27617 
CVE-2020-27821 CVE-2020-28916 CVE-2020-29129 CVE-2020-29443 CVE-2020-35504 
CVE-2020-35505 CVE-2021-3392 CVE-2021-3416 CVE-2021-3507 CVE-2021-3527 
CVE-2021-3582 CVE-2021-3607 CVE-2021-3608 CVE-2021-3682 CVE-2021-3713 
CVE-2021-3748 CVE-2021-3930 CVE-2021-4206 CVE-2021-4207 CVE-2021-20181 
CVE-2021-20196 CVE-2021-20203 CVE-2021-20221 CVE-2021-20257 CVE-2022-26354 
CVE-2022-35414}
+       [buster] - qemu 1:3.1+dfsg-8+deb10u9
 [04 Sep 2022] DLA-3098-1 libmodbus - security update
        {CVE-2022-0367}
        [buster] - libmodbus 3.1.4-2+deb10u2


=====================================
data/dla-needed.txt
=====================================
@@ -90,13 +90,6 @@ poppler (Markus Koschany)
 python-oslo.utils
   NOTE: 20220904: Programming language: Python.
 --
-qemu (Abhijith PA)
-  NOTE: 20220802: Programming language: C.
-  NOTE: 20220802: debdiff of backported fixes was submitted to 
buster-proposed-updates: 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1007931 and
-  NOTE: 20220802: wcan now be released as DLA instead. The updated packages 
are/were running fine in a buster ganeti cluster. (jmm)
-  NOTE: 20220808: conflicting pu at 
https://people.debian.org/~abhijith/upload/mruby/qemu_3.1+dfsg-8+deb10u9.dsc , 
needs to be merged (Beuc/abhijith)
-  NOTE: 20220822: Merged new build at 
https://people.debian.org/~abhijith/upload/mruby/qemu_3.1+dfsg-8+deb10u9.dsc 
(abhijith)
---
 runc
   NOTE: 20220905: Programming language: Go.
   NOTE: 20220905: Special attention: Sync with Bullseye.



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e2edf5f0e5cefe49899e33b40ad315305b2522e

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/0e2edf5f0e5cefe49899e33b40ad315305b2522e
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to