[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Sun Oct 30 08:10:30 GMT 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
6e803421 by security tracker role at 2022-10-30T08:10:21+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,843 @@
+CVE-2022-44418
+	RESERVED
+CVE-2022-44417
+	RESERVED
+CVE-2022-44416
+	RESERVED
+CVE-2022-44415
+	RESERVED
+CVE-2022-44414
+	RESERVED
+CVE-2022-44413
+	RESERVED
+CVE-2022-44412
+	RESERVED
+CVE-2022-44411
+	RESERVED
+CVE-2022-44410
+	RESERVED
+CVE-2022-44409
+	RESERVED
+CVE-2022-44408
+	RESERVED
+CVE-2022-44407
+	RESERVED
+CVE-2022-44406
+	RESERVED
+CVE-2022-44405
+	RESERVED
+CVE-2022-44404
+	RESERVED
+CVE-2022-44403
+	RESERVED
+CVE-2022-44402
+	RESERVED
+CVE-2022-44401
+	RESERVED
+CVE-2022-44400
+	RESERVED
+CVE-2022-44399
+	RESERVED
+CVE-2022-44398
+	RESERVED
+CVE-2022-44397
+	RESERVED
+CVE-2022-44396
+	RESERVED
+CVE-2022-44395
+	RESERVED
+CVE-2022-44394
+	RESERVED
+CVE-2022-44393
+	RESERVED
+CVE-2022-44392
+	RESERVED
+CVE-2022-44391
+	RESERVED
+CVE-2022-44390
+	RESERVED
+CVE-2022-44389
+	RESERVED
+CVE-2022-44388
+	RESERVED
+CVE-2022-44387
+	RESERVED
+CVE-2022-44386
+	RESERVED
+CVE-2022-44385
+	RESERVED
+CVE-2022-44384
+	RESERVED
+CVE-2022-44383
+	RESERVED
+CVE-2022-44382
+	RESERVED
+CVE-2022-44381
+	RESERVED
+CVE-2022-44380
+	RESERVED
+CVE-2022-44379
+	RESERVED
+CVE-2022-44378
+	RESERVED
+CVE-2022-44377
+	RESERVED
+CVE-2022-44376
+	RESERVED
+CVE-2022-44375
+	RESERVED
+CVE-2022-44374
+	RESERVED
+CVE-2022-44373
+	RESERVED
+CVE-2022-44372
+	RESERVED
+CVE-2022-44371
+	RESERVED
+CVE-2022-44370
+	RESERVED
+CVE-2022-44369
+	RESERVED
+CVE-2022-44368
+	RESERVED
+CVE-2022-44367
+	RESERVED
+CVE-2022-44366
+	RESERVED
+CVE-2022-44365
+	RESERVED
+CVE-2022-44364
+	RESERVED
+CVE-2022-44363
+	RESERVED
+CVE-2022-44362
+	RESERVED
+CVE-2022-44361
+	RESERVED
+CVE-2022-44360
+	RESERVED
+CVE-2022-44359
+	RESERVED
+CVE-2022-44358
+	RESERVED
+CVE-2022-44357
+	RESERVED
+CVE-2022-44356
+	RESERVED
+CVE-2022-44355
+	RESERVED
+CVE-2022-44354
+	RESERVED
+CVE-2022-44353
+	RESERVED
+CVE-2022-44352
+	RESERVED
+CVE-2022-44351
+	RESERVED
+CVE-2022-44350
+	RESERVED
+CVE-2022-44349
+	RESERVED
+CVE-2022-44348
+	RESERVED
+CVE-2022-44347
+	RESERVED
+CVE-2022-44346
+	RESERVED
+CVE-2022-44345
+	RESERVED
+CVE-2022-44344
+	RESERVED
+CVE-2022-44343
+	RESERVED
+CVE-2022-44342
+	RESERVED
+CVE-2022-44341
+	RESERVED
+CVE-2022-44340
+	RESERVED
+CVE-2022-44339
+	RESERVED
+CVE-2022-44338
+	RESERVED
+CVE-2022-44337
+	RESERVED
+CVE-2022-44336
+	RESERVED
+CVE-2022-44335
+	RESERVED
+CVE-2022-44334
+	RESERVED
+CVE-2022-44333
+	RESERVED
+CVE-2022-44332
+	RESERVED
+CVE-2022-44331
+	RESERVED
+CVE-2022-44330
+	RESERVED
+CVE-2022-44329
+	RESERVED
+CVE-2022-44328
+	RESERVED
+CVE-2022-44327
+	RESERVED
+CVE-2022-44326
+	RESERVED
+CVE-2022-44325
+	RESERVED
+CVE-2022-44324
+	RESERVED
+CVE-2022-44323
+	RESERVED
+CVE-2022-44322
+	RESERVED
+CVE-2022-44321
+	RESERVED
+CVE-2022-44320
+	RESERVED
+CVE-2022-44319
+	RESERVED
+CVE-2022-44318
+	RESERVED
+CVE-2022-44317
+	RESERVED
+CVE-2022-44316
+	RESERVED
+CVE-2022-44315
+	RESERVED
+CVE-2022-44314
+	RESERVED
+CVE-2022-44313
+	RESERVED
+CVE-2022-44312
+	RESERVED
+CVE-2022-44311
+	RESERVED
+CVE-2022-44310
+	RESERVED
+CVE-2022-44309
+	RESERVED
+CVE-2022-44308
+	RESERVED
+CVE-2022-44307
+	RESERVED
+CVE-2022-44306
+	RESERVED
+CVE-2022-44305
+	RESERVED
+CVE-2022-44304
+	RESERVED
+CVE-2022-44303
+	RESERVED
+CVE-2022-44302
+	RESERVED
+CVE-2022-44301
+	RESERVED
+CVE-2022-44300
+	RESERVED
+CVE-2022-44299
+	RESERVED
+CVE-2022-44298
+	RESERVED
+CVE-2022-44297
+	RESERVED
+CVE-2022-44296
+	RESERVED
+CVE-2022-44295
+	RESERVED
+CVE-2022-44294
+	RESERVED
+CVE-2022-44293
+	RESERVED
+CVE-2022-44292
+	RESERVED
+CVE-2022-44291
+	RESERVED
+CVE-2022-44290
+	RESERVED
+CVE-2022-44289
+	RESERVED
+CVE-2022-44288
+	RESERVED
+CVE-2022-44287
+	RESERVED
+CVE-2022-44286
+	RESERVED
+CVE-2022-44285
+	RESERVED
+CVE-2022-44284
+	RESERVED
+CVE-2022-44283
+	RESERVED
+CVE-2022-44282
+	RESERVED
+CVE-2022-44281
+	RESERVED
+CVE-2022-44280
+	RESERVED
+CVE-2022-44279
+	RESERVED
+CVE-2022-44278
+	RESERVED
+CVE-2022-44277
+	RESERVED
+CVE-2022-44276
+	RESERVED
+CVE-2022-44275
+	RESERVED
+CVE-2022-44274
+	RESERVED
+CVE-2022-44273
+	RESERVED
+CVE-2022-44272
+	RESERVED
+CVE-2022-44271
+	RESERVED
+CVE-2022-44270
+	RESERVED
+CVE-2022-44269
+	RESERVED
+CVE-2022-44268
+	RESERVED
+CVE-2022-44267
+	RESERVED
+CVE-2022-44266
+	RESERVED
+CVE-2022-44265
+	RESERVED
+CVE-2022-44264
+	RESERVED
+CVE-2022-44263
+	RESERVED
+CVE-2022-44262
+	RESERVED
+CVE-2022-44261
+	RESERVED
+CVE-2022-44260
+	RESERVED
+CVE-2022-44259
+	RESERVED
+CVE-2022-44258
+	RESERVED
+CVE-2022-44257
+	RESERVED
+CVE-2022-44256
+	RESERVED
+CVE-2022-44255
+	RESERVED
+CVE-2022-44254
+	RESERVED
+CVE-2022-44253
+	RESERVED
+CVE-2022-44252
+	RESERVED
+CVE-2022-44251
+	RESERVED
+CVE-2022-44250
+	RESERVED
+CVE-2022-44249
+	RESERVED
+CVE-2022-44248
+	RESERVED
+CVE-2022-44247
+	RESERVED
+CVE-2022-44246
+	RESERVED
+CVE-2022-44245
+	RESERVED
+CVE-2022-44244
+	RESERVED
+CVE-2022-44243
+	RESERVED
+CVE-2022-44242
+	RESERVED
+CVE-2022-44241
+	RESERVED
+CVE-2022-44240
+	RESERVED
+CVE-2022-44239
+	RESERVED
+CVE-2022-44238
+	RESERVED
+CVE-2022-44237
+	RESERVED
+CVE-2022-44236
+	RESERVED
+CVE-2022-44235
+	RESERVED
+CVE-2022-44234
+	RESERVED
+CVE-2022-44233
+	RESERVED
+CVE-2022-44232
+	RESERVED
+CVE-2022-44231
+	RESERVED
+CVE-2022-44230
+	RESERVED
+CVE-2022-44229
+	RESERVED
+CVE-2022-44228
+	RESERVED
+CVE-2022-44227
+	RESERVED
+CVE-2022-44226
+	RESERVED
+CVE-2022-44225
+	RESERVED
+CVE-2022-44224
+	RESERVED
+CVE-2022-44223
+	RESERVED
+CVE-2022-44222
+	RESERVED
+CVE-2022-44221
+	RESERVED
+CVE-2022-44220
+	RESERVED
+CVE-2022-44219
+	RESERVED
+CVE-2022-44218
+	RESERVED
+CVE-2022-44217
+	RESERVED
+CVE-2022-44216
+	RESERVED
+CVE-2022-44215
+	RESERVED
+CVE-2022-44214
+	RESERVED
+CVE-2022-44213
+	RESERVED
+CVE-2022-44212
+	RESERVED
+CVE-2022-44211
+	RESERVED
+CVE-2022-44210
+	RESERVED
+CVE-2022-44209
+	RESERVED
+CVE-2022-44208
+	RESERVED
+CVE-2022-44207
+	RESERVED
+CVE-2022-44206
+	RESERVED
+CVE-2022-44205
+	RESERVED
+CVE-2022-44204
+	RESERVED
+CVE-2022-44203
+	RESERVED
+CVE-2022-44202
+	RESERVED
+CVE-2022-44201
+	RESERVED
+CVE-2022-44200
+	RESERVED
+CVE-2022-44199
+	RESERVED
+CVE-2022-44198
+	RESERVED
+CVE-2022-44197
+	RESERVED
+CVE-2022-44196
+	RESERVED
+CVE-2022-44195
+	RESERVED
+CVE-2022-44194
+	RESERVED
+CVE-2022-44193
+	RESERVED
+CVE-2022-44192
+	RESERVED
+CVE-2022-44191
+	RESERVED
+CVE-2022-44190
+	RESERVED
+CVE-2022-44189
+	RESERVED
+CVE-2022-44188
+	RESERVED
+CVE-2022-44187
+	RESERVED
+CVE-2022-44186
+	RESERVED
+CVE-2022-44185
+	RESERVED
+CVE-2022-44184
+	RESERVED
+CVE-2022-44183
+	RESERVED
+CVE-2022-44182
+	RESERVED
+CVE-2022-44181
+	RESERVED
+CVE-2022-44180
+	RESERVED
+CVE-2022-44179
+	RESERVED
+CVE-2022-44178
+	RESERVED
+CVE-2022-44177
+	RESERVED
+CVE-2022-44176
+	RESERVED
+CVE-2022-44175
+	RESERVED
+CVE-2022-44174
+	RESERVED
+CVE-2022-44173
+	RESERVED
+CVE-2022-44172
+	RESERVED
+CVE-2022-44171
+	RESERVED
+CVE-2022-44170
+	RESERVED
+CVE-2022-44169
+	RESERVED
+CVE-2022-44168
+	RESERVED
+CVE-2022-44167
+	RESERVED
+CVE-2022-44166
+	RESERVED
+CVE-2022-44165
+	RESERVED
+CVE-2022-44164
+	RESERVED
+CVE-2022-44163
+	RESERVED
+CVE-2022-44162
+	RESERVED
+CVE-2022-44161
+	RESERVED
+CVE-2022-44160
+	RESERVED
+CVE-2022-44159
+	RESERVED
+CVE-2022-44158
+	RESERVED
+CVE-2022-44157
+	RESERVED
+CVE-2022-44156
+	RESERVED
+CVE-2022-44155
+	RESERVED
+CVE-2022-44154
+	RESERVED
+CVE-2022-44153
+	RESERVED
+CVE-2022-44152
+	RESERVED
+CVE-2022-44151
+	RESERVED
+CVE-2022-44150
+	RESERVED
+CVE-2022-44149
+	RESERVED
+CVE-2022-44148
+	RESERVED
+CVE-2022-44147
+	RESERVED
+CVE-2022-44146
+	RESERVED
+CVE-2022-44145
+	RESERVED
+CVE-2022-44144
+	RESERVED
+CVE-2022-44143
+	RESERVED
+CVE-2022-44142
+	RESERVED
+CVE-2022-44141
+	RESERVED
+CVE-2022-44140
+	RESERVED
+CVE-2022-44139
+	RESERVED
+CVE-2022-44138
+	RESERVED
+CVE-2022-44137
+	RESERVED
+CVE-2022-44136
+	RESERVED
+CVE-2022-44135
+	RESERVED
+CVE-2022-44134
+	RESERVED
+CVE-2022-44133
+	RESERVED
+CVE-2022-44132
+	RESERVED
+CVE-2022-44131
+	RESERVED
+CVE-2022-44130
+	RESERVED
+CVE-2022-44129
+	RESERVED
+CVE-2022-44128
+	RESERVED
+CVE-2022-44127
+	RESERVED
+CVE-2022-44126
+	RESERVED
+CVE-2022-44125
+	RESERVED
+CVE-2022-44124
+	RESERVED
+CVE-2022-44123
+	RESERVED
+CVE-2022-44122
+	RESERVED
+CVE-2022-44121
+	RESERVED
+CVE-2022-44120
+	RESERVED
+CVE-2022-44119
+	RESERVED
+CVE-2022-44118
+	RESERVED
+CVE-2022-44117
+	RESERVED
+CVE-2022-44116
+	RESERVED
+CVE-2022-44115
+	RESERVED
+CVE-2022-44114
+	RESERVED
+CVE-2022-44113
+	RESERVED
+CVE-2022-44112
+	RESERVED
+CVE-2022-44111
+	RESERVED
+CVE-2022-44110
+	RESERVED
+CVE-2022-44109
+	RESERVED
+CVE-2022-44108
+	RESERVED
+CVE-2022-44107
+	RESERVED
+CVE-2022-44106
+	RESERVED
+CVE-2022-44105
+	RESERVED
+CVE-2022-44104
+	RESERVED
+CVE-2022-44103
+	RESERVED
+CVE-2022-44102
+	RESERVED
+CVE-2022-44101
+	RESERVED
+CVE-2022-44100
+	RESERVED
+CVE-2022-44099
+	RESERVED
+CVE-2022-44098
+	RESERVED
+CVE-2022-44097
+	RESERVED
+CVE-2022-44096
+	RESERVED
+CVE-2022-44095
+	RESERVED
+CVE-2022-44094
+	RESERVED
+CVE-2022-44093
+	RESERVED
+CVE-2022-44092
+	RESERVED
+CVE-2022-44091
+	RESERVED
+CVE-2022-44090
+	RESERVED
+CVE-2022-44089
+	RESERVED
+CVE-2022-44088
+	RESERVED
+CVE-2022-44087
+	RESERVED
+CVE-2022-44086
+	RESERVED
+CVE-2022-44085
+	RESERVED
+CVE-2022-44084
+	RESERVED
+CVE-2022-44083
+	RESERVED
+CVE-2022-44082
+	RESERVED
+CVE-2022-44081
+	RESERVED
+CVE-2022-44080
+	RESERVED
+CVE-2022-44079
+	RESERVED
+CVE-2022-44078
+	RESERVED
+CVE-2022-44077
+	RESERVED
+CVE-2022-44076
+	RESERVED
+CVE-2022-44075
+	RESERVED
+CVE-2022-44074
+	RESERVED
+CVE-2022-44073
+	RESERVED
+CVE-2022-44072
+	RESERVED
+CVE-2022-44071
+	RESERVED
+CVE-2022-44070
+	RESERVED
+CVE-2022-44069
+	RESERVED
+CVE-2022-44068
+	RESERVED
+CVE-2022-44067
+	RESERVED
+CVE-2022-44066
+	RESERVED
+CVE-2022-44065
+	RESERVED
+CVE-2022-44064
+	RESERVED
+CVE-2022-44063
+	RESERVED
+CVE-2022-44062
+	RESERVED
+CVE-2022-44061
+	RESERVED
+CVE-2022-44060
+	RESERVED
+CVE-2022-44059
+	RESERVED
+CVE-2022-44058
+	RESERVED
+CVE-2022-44057
+	RESERVED
+CVE-2022-44056
+	RESERVED
+CVE-2022-44055
+	RESERVED
+CVE-2022-44054
+	RESERVED
+CVE-2022-44053
+	RESERVED
+CVE-2022-44052
+	RESERVED
+CVE-2022-44051
+	RESERVED
+CVE-2022-44050
+	RESERVED
+CVE-2022-44049
+	RESERVED
+CVE-2022-44048
+	RESERVED
+CVE-2022-44047
+	RESERVED
+CVE-2022-44046
+	RESERVED
+CVE-2022-44045
+	RESERVED
+CVE-2022-44044
+	RESERVED
+CVE-2022-44043
+	RESERVED
+CVE-2022-44042
+	RESERVED
+CVE-2022-44041
+	RESERVED
+CVE-2022-44040
+	RESERVED
+CVE-2022-44039
+	RESERVED
+CVE-2022-44038
+	RESERVED
+CVE-2022-44037
+	RESERVED
+CVE-2022-44036
+	RESERVED
+CVE-2022-44035
+	RESERVED
+CVE-2022-44034 (An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ...)
+	TODO: check
+CVE-2022-44033 (An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ...)
+	TODO: check
+CVE-2022-44032 (An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ...)
+	TODO: check
+CVE-2022-44031
+	RESERVED
+CVE-2022-44030
+	RESERVED
+CVE-2022-44029
+	RESERVED
+CVE-2022-44028
+	RESERVED
+CVE-2022-44027
+	RESERVED
+CVE-2022-44026
+	RESERVED
+CVE-2022-44025
+	RESERVED
+CVE-2022-44024
+	RESERVED
+CVE-2022-44023 (PwnDoc through 0.5.3 might allow remote attackers to identify disabled ...)
+	TODO: check
+CVE-2022-44022 (PwnDoc through 0.5.3 might allow remote attackers to identify valid us ...)
+	TODO: check
+CVE-2022-44021
+	RESERVED
+CVE-2022-44020 (An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and Vi ...)
+	TODO: check
+CVE-2022-44019 (In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote comm ...)
+	TODO: check
+CVE-2022-44018
+	RESERVED
+CVE-2022-44017
+	RESERVED
+CVE-2022-44016
+	RESERVED
+CVE-2022-44015
+	RESERVED
+CVE-2022-44014
+	RESERVED
+CVE-2022-44013
+	RESERVED
+CVE-2022-44012
+	RESERVED
+CVE-2022-44011
+	RESERVED
+CVE-2022-44010
+	RESERVED
+CVE-2022-44009
+	RESERVED
+CVE-2022-44008
+	RESERVED
+CVE-2022-44007
+	RESERVED
+CVE-2022-44006
+	RESERVED
+CVE-2022-44005
+	RESERVED
+CVE-2022-44004
+	RESERVED
+CVE-2022-44003
+	RESERVED
+CVE-2022-44002
+	RESERVED
+CVE-2022-44001
+	RESERVED
+CVE-2022-44000
+	RESERVED
+CVE-2022-43999
+	RESERVED
 CVE-2022-43998
 	RESERVED
 CVE-2022-3757 (A vulnerability was found in Exiv2. It has been declared as critical.  ...)
@@ -1900,6 +2740,7 @@ CVE-2022-3724
 	RESERVED
 CVE-2022-3723
 	RESERVED
+	{DSA-5263-1}
 	- chromium 107.0.5304.87-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
 CVE-2022-3722
@@ -4687,8 +5528,7 @@ CVE-2022-42916 (In curl before 7.86.0, the HSTS check could be bypassed to trick
 	NOTE: Introduced with: https://github.com/curl/curl/commit/7385610d0c74c6a254fea5e4cd6e1d559d848c8c (curl-7_74_0)
 	NOTE: Enabled by default since: https://github.com/curl/curl/commit/d71ff2b9db566b3f4b2eb29441c2df86715d4339 (curl-7_77_0)
 	NOTE: Fixed by: https://github.com/curl/curl/commit/53bcf55b4538067e6dc36242168866becb987bb7 (curl-7_86_0)
-CVE-2022-42915 [HTTP proxy double-free]
-	RESERVED
+CVE-2022-42915 (curl before 7.86.0 has a double free. If curl is told to use an HTTP p ...)
 	- curl 7.86.0-1
 	[bullseye] - curl <not-affected> (Vulnerable code not present)
 	[buster] - curl <not-affected> (Vulnerable code not present)
@@ -4795,7 +5635,7 @@ CVE-2022-42892
 CVE-2022-42891
 	RESERVED
 CVE-2022-42890 (A vulnerability in Batik of Apache XML Graphics allows an attacker to  ...)
-	{DLA-3169-1}
+	{DSA-5264-1 DLA-3169-1}
 	- batik 1.16+dfsg-1
 	NOTE: https://www.openwall.com/lists/oss-security/2022/10/25/3
 	NOTE: https://issues.apache.org/jira/browse/BATIK-1345
@@ -7561,7 +8401,7 @@ CVE-2022-41706
 CVE-2022-41705
 	RESERVED
 CVE-2022-41704 (A vulnerability in Batik of Apache XML Graphics allows an attacker to  ...)
-	{DLA-3169-1}
+	{DSA-5264-1 DLA-3169-1}
 	- batik 1.16+dfsg-1
 	NOTE: https://www.openwall.com/lists/oss-security/2022/10/25/2
 	NOTE: https://issues.apache.org/jira/browse/BATIK-1338
@@ -39459,7 +40299,7 @@ CVE-2022-29897 (On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin
 CVE-2022-29892 (Improper input validation vulnerability in Space of Cybozu Garoon 4.0. ...)
 	NOT-FOR-US: Cybozu
 CVE-2022-29885 (The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1  ...)
-	{DLA-3160-1}
+	{DSA-5265-1 DLA-3160-1}
 	- tomcat9 9.0.63-1
 	- tomcat8 <removed>
 	[stretch] - tomcat8 <postponed> (Minor issue)
@@ -60397,7 +61237,7 @@ CVE-2022-23185
 CVE-2022-23184 (In affected Octopus Server versions when the server HTTP and HTTPS bin ...)
 	NOT-FOR-US: Octopus Server
 CVE-2022-23181 (The fix for bug CVE-2020-9484 introduced a time of check, time of use  ...)
-	{DLA-3160-1}
+	{DSA-5265-1 DLA-3160-1}
 	- tomcat9 9.0.58-1
 	- tomcat8 <removed>
 	[stretch] - tomcat8 <postponed> (Minor issue; local race condition)
@@ -71052,7 +71892,7 @@ CVE-2021-43982 (Delta Electronics CNCSoft Versions 1.01.30 and prior are vulnera
 CVE-2021-43981 (mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, ...)
 	NOT-FOR-US: mySCADA myPRO
 CVE-2021-43980 (The simplified implementation of blocking reads and writes introduced  ...)
-	{DLA-3160-1}
+	{DSA-5265-1 DLA-3160-1}
 	- tomcat9 9.0.62-1
 	- tomcat8 <removed>
 	NOTE: https://lists.apache.org/thread/3jjqbsp6j88b198x5rmg99b1qr8ht3g3



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e8034212bf03dfc1a7b295ce424272073de26cc

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e8034212bf03dfc1a7b295ce424272073de26cc
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221030/83ec4d64/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list