[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Oct 30 08:10:30 GMT 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6e803421 by security tracker role at 2022-10-30T08:10:21+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,843 @@
+CVE-2022-44418
+ RESERVED
+CVE-2022-44417
+ RESERVED
+CVE-2022-44416
+ RESERVED
+CVE-2022-44415
+ RESERVED
+CVE-2022-44414
+ RESERVED
+CVE-2022-44413
+ RESERVED
+CVE-2022-44412
+ RESERVED
+CVE-2022-44411
+ RESERVED
+CVE-2022-44410
+ RESERVED
+CVE-2022-44409
+ RESERVED
+CVE-2022-44408
+ RESERVED
+CVE-2022-44407
+ RESERVED
+CVE-2022-44406
+ RESERVED
+CVE-2022-44405
+ RESERVED
+CVE-2022-44404
+ RESERVED
+CVE-2022-44403
+ RESERVED
+CVE-2022-44402
+ RESERVED
+CVE-2022-44401
+ RESERVED
+CVE-2022-44400
+ RESERVED
+CVE-2022-44399
+ RESERVED
+CVE-2022-44398
+ RESERVED
+CVE-2022-44397
+ RESERVED
+CVE-2022-44396
+ RESERVED
+CVE-2022-44395
+ RESERVED
+CVE-2022-44394
+ RESERVED
+CVE-2022-44393
+ RESERVED
+CVE-2022-44392
+ RESERVED
+CVE-2022-44391
+ RESERVED
+CVE-2022-44390
+ RESERVED
+CVE-2022-44389
+ RESERVED
+CVE-2022-44388
+ RESERVED
+CVE-2022-44387
+ RESERVED
+CVE-2022-44386
+ RESERVED
+CVE-2022-44385
+ RESERVED
+CVE-2022-44384
+ RESERVED
+CVE-2022-44383
+ RESERVED
+CVE-2022-44382
+ RESERVED
+CVE-2022-44381
+ RESERVED
+CVE-2022-44380
+ RESERVED
+CVE-2022-44379
+ RESERVED
+CVE-2022-44378
+ RESERVED
+CVE-2022-44377
+ RESERVED
+CVE-2022-44376
+ RESERVED
+CVE-2022-44375
+ RESERVED
+CVE-2022-44374
+ RESERVED
+CVE-2022-44373
+ RESERVED
+CVE-2022-44372
+ RESERVED
+CVE-2022-44371
+ RESERVED
+CVE-2022-44370
+ RESERVED
+CVE-2022-44369
+ RESERVED
+CVE-2022-44368
+ RESERVED
+CVE-2022-44367
+ RESERVED
+CVE-2022-44366
+ RESERVED
+CVE-2022-44365
+ RESERVED
+CVE-2022-44364
+ RESERVED
+CVE-2022-44363
+ RESERVED
+CVE-2022-44362
+ RESERVED
+CVE-2022-44361
+ RESERVED
+CVE-2022-44360
+ RESERVED
+CVE-2022-44359
+ RESERVED
+CVE-2022-44358
+ RESERVED
+CVE-2022-44357
+ RESERVED
+CVE-2022-44356
+ RESERVED
+CVE-2022-44355
+ RESERVED
+CVE-2022-44354
+ RESERVED
+CVE-2022-44353
+ RESERVED
+CVE-2022-44352
+ RESERVED
+CVE-2022-44351
+ RESERVED
+CVE-2022-44350
+ RESERVED
+CVE-2022-44349
+ RESERVED
+CVE-2022-44348
+ RESERVED
+CVE-2022-44347
+ RESERVED
+CVE-2022-44346
+ RESERVED
+CVE-2022-44345
+ RESERVED
+CVE-2022-44344
+ RESERVED
+CVE-2022-44343
+ RESERVED
+CVE-2022-44342
+ RESERVED
+CVE-2022-44341
+ RESERVED
+CVE-2022-44340
+ RESERVED
+CVE-2022-44339
+ RESERVED
+CVE-2022-44338
+ RESERVED
+CVE-2022-44337
+ RESERVED
+CVE-2022-44336
+ RESERVED
+CVE-2022-44335
+ RESERVED
+CVE-2022-44334
+ RESERVED
+CVE-2022-44333
+ RESERVED
+CVE-2022-44332
+ RESERVED
+CVE-2022-44331
+ RESERVED
+CVE-2022-44330
+ RESERVED
+CVE-2022-44329
+ RESERVED
+CVE-2022-44328
+ RESERVED
+CVE-2022-44327
+ RESERVED
+CVE-2022-44326
+ RESERVED
+CVE-2022-44325
+ RESERVED
+CVE-2022-44324
+ RESERVED
+CVE-2022-44323
+ RESERVED
+CVE-2022-44322
+ RESERVED
+CVE-2022-44321
+ RESERVED
+CVE-2022-44320
+ RESERVED
+CVE-2022-44319
+ RESERVED
+CVE-2022-44318
+ RESERVED
+CVE-2022-44317
+ RESERVED
+CVE-2022-44316
+ RESERVED
+CVE-2022-44315
+ RESERVED
+CVE-2022-44314
+ RESERVED
+CVE-2022-44313
+ RESERVED
+CVE-2022-44312
+ RESERVED
+CVE-2022-44311
+ RESERVED
+CVE-2022-44310
+ RESERVED
+CVE-2022-44309
+ RESERVED
+CVE-2022-44308
+ RESERVED
+CVE-2022-44307
+ RESERVED
+CVE-2022-44306
+ RESERVED
+CVE-2022-44305
+ RESERVED
+CVE-2022-44304
+ RESERVED
+CVE-2022-44303
+ RESERVED
+CVE-2022-44302
+ RESERVED
+CVE-2022-44301
+ RESERVED
+CVE-2022-44300
+ RESERVED
+CVE-2022-44299
+ RESERVED
+CVE-2022-44298
+ RESERVED
+CVE-2022-44297
+ RESERVED
+CVE-2022-44296
+ RESERVED
+CVE-2022-44295
+ RESERVED
+CVE-2022-44294
+ RESERVED
+CVE-2022-44293
+ RESERVED
+CVE-2022-44292
+ RESERVED
+CVE-2022-44291
+ RESERVED
+CVE-2022-44290
+ RESERVED
+CVE-2022-44289
+ RESERVED
+CVE-2022-44288
+ RESERVED
+CVE-2022-44287
+ RESERVED
+CVE-2022-44286
+ RESERVED
+CVE-2022-44285
+ RESERVED
+CVE-2022-44284
+ RESERVED
+CVE-2022-44283
+ RESERVED
+CVE-2022-44282
+ RESERVED
+CVE-2022-44281
+ RESERVED
+CVE-2022-44280
+ RESERVED
+CVE-2022-44279
+ RESERVED
+CVE-2022-44278
+ RESERVED
+CVE-2022-44277
+ RESERVED
+CVE-2022-44276
+ RESERVED
+CVE-2022-44275
+ RESERVED
+CVE-2022-44274
+ RESERVED
+CVE-2022-44273
+ RESERVED
+CVE-2022-44272
+ RESERVED
+CVE-2022-44271
+ RESERVED
+CVE-2022-44270
+ RESERVED
+CVE-2022-44269
+ RESERVED
+CVE-2022-44268
+ RESERVED
+CVE-2022-44267
+ RESERVED
+CVE-2022-44266
+ RESERVED
+CVE-2022-44265
+ RESERVED
+CVE-2022-44264
+ RESERVED
+CVE-2022-44263
+ RESERVED
+CVE-2022-44262
+ RESERVED
+CVE-2022-44261
+ RESERVED
+CVE-2022-44260
+ RESERVED
+CVE-2022-44259
+ RESERVED
+CVE-2022-44258
+ RESERVED
+CVE-2022-44257
+ RESERVED
+CVE-2022-44256
+ RESERVED
+CVE-2022-44255
+ RESERVED
+CVE-2022-44254
+ RESERVED
+CVE-2022-44253
+ RESERVED
+CVE-2022-44252
+ RESERVED
+CVE-2022-44251
+ RESERVED
+CVE-2022-44250
+ RESERVED
+CVE-2022-44249
+ RESERVED
+CVE-2022-44248
+ RESERVED
+CVE-2022-44247
+ RESERVED
+CVE-2022-44246
+ RESERVED
+CVE-2022-44245
+ RESERVED
+CVE-2022-44244
+ RESERVED
+CVE-2022-44243
+ RESERVED
+CVE-2022-44242
+ RESERVED
+CVE-2022-44241
+ RESERVED
+CVE-2022-44240
+ RESERVED
+CVE-2022-44239
+ RESERVED
+CVE-2022-44238
+ RESERVED
+CVE-2022-44237
+ RESERVED
+CVE-2022-44236
+ RESERVED
+CVE-2022-44235
+ RESERVED
+CVE-2022-44234
+ RESERVED
+CVE-2022-44233
+ RESERVED
+CVE-2022-44232
+ RESERVED
+CVE-2022-44231
+ RESERVED
+CVE-2022-44230
+ RESERVED
+CVE-2022-44229
+ RESERVED
+CVE-2022-44228
+ RESERVED
+CVE-2022-44227
+ RESERVED
+CVE-2022-44226
+ RESERVED
+CVE-2022-44225
+ RESERVED
+CVE-2022-44224
+ RESERVED
+CVE-2022-44223
+ RESERVED
+CVE-2022-44222
+ RESERVED
+CVE-2022-44221
+ RESERVED
+CVE-2022-44220
+ RESERVED
+CVE-2022-44219
+ RESERVED
+CVE-2022-44218
+ RESERVED
+CVE-2022-44217
+ RESERVED
+CVE-2022-44216
+ RESERVED
+CVE-2022-44215
+ RESERVED
+CVE-2022-44214
+ RESERVED
+CVE-2022-44213
+ RESERVED
+CVE-2022-44212
+ RESERVED
+CVE-2022-44211
+ RESERVED
+CVE-2022-44210
+ RESERVED
+CVE-2022-44209
+ RESERVED
+CVE-2022-44208
+ RESERVED
+CVE-2022-44207
+ RESERVED
+CVE-2022-44206
+ RESERVED
+CVE-2022-44205
+ RESERVED
+CVE-2022-44204
+ RESERVED
+CVE-2022-44203
+ RESERVED
+CVE-2022-44202
+ RESERVED
+CVE-2022-44201
+ RESERVED
+CVE-2022-44200
+ RESERVED
+CVE-2022-44199
+ RESERVED
+CVE-2022-44198
+ RESERVED
+CVE-2022-44197
+ RESERVED
+CVE-2022-44196
+ RESERVED
+CVE-2022-44195
+ RESERVED
+CVE-2022-44194
+ RESERVED
+CVE-2022-44193
+ RESERVED
+CVE-2022-44192
+ RESERVED
+CVE-2022-44191
+ RESERVED
+CVE-2022-44190
+ RESERVED
+CVE-2022-44189
+ RESERVED
+CVE-2022-44188
+ RESERVED
+CVE-2022-44187
+ RESERVED
+CVE-2022-44186
+ RESERVED
+CVE-2022-44185
+ RESERVED
+CVE-2022-44184
+ RESERVED
+CVE-2022-44183
+ RESERVED
+CVE-2022-44182
+ RESERVED
+CVE-2022-44181
+ RESERVED
+CVE-2022-44180
+ RESERVED
+CVE-2022-44179
+ RESERVED
+CVE-2022-44178
+ RESERVED
+CVE-2022-44177
+ RESERVED
+CVE-2022-44176
+ RESERVED
+CVE-2022-44175
+ RESERVED
+CVE-2022-44174
+ RESERVED
+CVE-2022-44173
+ RESERVED
+CVE-2022-44172
+ RESERVED
+CVE-2022-44171
+ RESERVED
+CVE-2022-44170
+ RESERVED
+CVE-2022-44169
+ RESERVED
+CVE-2022-44168
+ RESERVED
+CVE-2022-44167
+ RESERVED
+CVE-2022-44166
+ RESERVED
+CVE-2022-44165
+ RESERVED
+CVE-2022-44164
+ RESERVED
+CVE-2022-44163
+ RESERVED
+CVE-2022-44162
+ RESERVED
+CVE-2022-44161
+ RESERVED
+CVE-2022-44160
+ RESERVED
+CVE-2022-44159
+ RESERVED
+CVE-2022-44158
+ RESERVED
+CVE-2022-44157
+ RESERVED
+CVE-2022-44156
+ RESERVED
+CVE-2022-44155
+ RESERVED
+CVE-2022-44154
+ RESERVED
+CVE-2022-44153
+ RESERVED
+CVE-2022-44152
+ RESERVED
+CVE-2022-44151
+ RESERVED
+CVE-2022-44150
+ RESERVED
+CVE-2022-44149
+ RESERVED
+CVE-2022-44148
+ RESERVED
+CVE-2022-44147
+ RESERVED
+CVE-2022-44146
+ RESERVED
+CVE-2022-44145
+ RESERVED
+CVE-2022-44144
+ RESERVED
+CVE-2022-44143
+ RESERVED
+CVE-2022-44142
+ RESERVED
+CVE-2022-44141
+ RESERVED
+CVE-2022-44140
+ RESERVED
+CVE-2022-44139
+ RESERVED
+CVE-2022-44138
+ RESERVED
+CVE-2022-44137
+ RESERVED
+CVE-2022-44136
+ RESERVED
+CVE-2022-44135
+ RESERVED
+CVE-2022-44134
+ RESERVED
+CVE-2022-44133
+ RESERVED
+CVE-2022-44132
+ RESERVED
+CVE-2022-44131
+ RESERVED
+CVE-2022-44130
+ RESERVED
+CVE-2022-44129
+ RESERVED
+CVE-2022-44128
+ RESERVED
+CVE-2022-44127
+ RESERVED
+CVE-2022-44126
+ RESERVED
+CVE-2022-44125
+ RESERVED
+CVE-2022-44124
+ RESERVED
+CVE-2022-44123
+ RESERVED
+CVE-2022-44122
+ RESERVED
+CVE-2022-44121
+ RESERVED
+CVE-2022-44120
+ RESERVED
+CVE-2022-44119
+ RESERVED
+CVE-2022-44118
+ RESERVED
+CVE-2022-44117
+ RESERVED
+CVE-2022-44116
+ RESERVED
+CVE-2022-44115
+ RESERVED
+CVE-2022-44114
+ RESERVED
+CVE-2022-44113
+ RESERVED
+CVE-2022-44112
+ RESERVED
+CVE-2022-44111
+ RESERVED
+CVE-2022-44110
+ RESERVED
+CVE-2022-44109
+ RESERVED
+CVE-2022-44108
+ RESERVED
+CVE-2022-44107
+ RESERVED
+CVE-2022-44106
+ RESERVED
+CVE-2022-44105
+ RESERVED
+CVE-2022-44104
+ RESERVED
+CVE-2022-44103
+ RESERVED
+CVE-2022-44102
+ RESERVED
+CVE-2022-44101
+ RESERVED
+CVE-2022-44100
+ RESERVED
+CVE-2022-44099
+ RESERVED
+CVE-2022-44098
+ RESERVED
+CVE-2022-44097
+ RESERVED
+CVE-2022-44096
+ RESERVED
+CVE-2022-44095
+ RESERVED
+CVE-2022-44094
+ RESERVED
+CVE-2022-44093
+ RESERVED
+CVE-2022-44092
+ RESERVED
+CVE-2022-44091
+ RESERVED
+CVE-2022-44090
+ RESERVED
+CVE-2022-44089
+ RESERVED
+CVE-2022-44088
+ RESERVED
+CVE-2022-44087
+ RESERVED
+CVE-2022-44086
+ RESERVED
+CVE-2022-44085
+ RESERVED
+CVE-2022-44084
+ RESERVED
+CVE-2022-44083
+ RESERVED
+CVE-2022-44082
+ RESERVED
+CVE-2022-44081
+ RESERVED
+CVE-2022-44080
+ RESERVED
+CVE-2022-44079
+ RESERVED
+CVE-2022-44078
+ RESERVED
+CVE-2022-44077
+ RESERVED
+CVE-2022-44076
+ RESERVED
+CVE-2022-44075
+ RESERVED
+CVE-2022-44074
+ RESERVED
+CVE-2022-44073
+ RESERVED
+CVE-2022-44072
+ RESERVED
+CVE-2022-44071
+ RESERVED
+CVE-2022-44070
+ RESERVED
+CVE-2022-44069
+ RESERVED
+CVE-2022-44068
+ RESERVED
+CVE-2022-44067
+ RESERVED
+CVE-2022-44066
+ RESERVED
+CVE-2022-44065
+ RESERVED
+CVE-2022-44064
+ RESERVED
+CVE-2022-44063
+ RESERVED
+CVE-2022-44062
+ RESERVED
+CVE-2022-44061
+ RESERVED
+CVE-2022-44060
+ RESERVED
+CVE-2022-44059
+ RESERVED
+CVE-2022-44058
+ RESERVED
+CVE-2022-44057
+ RESERVED
+CVE-2022-44056
+ RESERVED
+CVE-2022-44055
+ RESERVED
+CVE-2022-44054
+ RESERVED
+CVE-2022-44053
+ RESERVED
+CVE-2022-44052
+ RESERVED
+CVE-2022-44051
+ RESERVED
+CVE-2022-44050
+ RESERVED
+CVE-2022-44049
+ RESERVED
+CVE-2022-44048
+ RESERVED
+CVE-2022-44047
+ RESERVED
+CVE-2022-44046
+ RESERVED
+CVE-2022-44045
+ RESERVED
+CVE-2022-44044
+ RESERVED
+CVE-2022-44043
+ RESERVED
+CVE-2022-44042
+ RESERVED
+CVE-2022-44041
+ RESERVED
+CVE-2022-44040
+ RESERVED
+CVE-2022-44039
+ RESERVED
+CVE-2022-44038
+ RESERVED
+CVE-2022-44037
+ RESERVED
+CVE-2022-44036
+ RESERVED
+CVE-2022-44035
+ RESERVED
+CVE-2022-44034 (An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ...)
+ TODO: check
+CVE-2022-44033 (An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ...)
+ TODO: check
+CVE-2022-44032 (An issue was discovered in the Linux kernel through 6.0.6. drivers/cha ...)
+ TODO: check
+CVE-2022-44031
+ RESERVED
+CVE-2022-44030
+ RESERVED
+CVE-2022-44029
+ RESERVED
+CVE-2022-44028
+ RESERVED
+CVE-2022-44027
+ RESERVED
+CVE-2022-44026
+ RESERVED
+CVE-2022-44025
+ RESERVED
+CVE-2022-44024
+ RESERVED
+CVE-2022-44023 (PwnDoc through 0.5.3 might allow remote attackers to identify disabled ...)
+ TODO: check
+CVE-2022-44022 (PwnDoc through 0.5.3 might allow remote attackers to identify valid us ...)
+ TODO: check
+CVE-2022-44021
+ RESERVED
+CVE-2022-44020 (An issue was discovered in OpenStack Sushy-Tools through 0.21.0 and Vi ...)
+ TODO: check
+CVE-2022-44019 (In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote comm ...)
+ TODO: check
+CVE-2022-44018
+ RESERVED
+CVE-2022-44017
+ RESERVED
+CVE-2022-44016
+ RESERVED
+CVE-2022-44015
+ RESERVED
+CVE-2022-44014
+ RESERVED
+CVE-2022-44013
+ RESERVED
+CVE-2022-44012
+ RESERVED
+CVE-2022-44011
+ RESERVED
+CVE-2022-44010
+ RESERVED
+CVE-2022-44009
+ RESERVED
+CVE-2022-44008
+ RESERVED
+CVE-2022-44007
+ RESERVED
+CVE-2022-44006
+ RESERVED
+CVE-2022-44005
+ RESERVED
+CVE-2022-44004
+ RESERVED
+CVE-2022-44003
+ RESERVED
+CVE-2022-44002
+ RESERVED
+CVE-2022-44001
+ RESERVED
+CVE-2022-44000
+ RESERVED
+CVE-2022-43999
+ RESERVED
CVE-2022-43998
RESERVED
CVE-2022-3757 (A vulnerability was found in Exiv2. It has been declared as critical. ...)
@@ -1900,6 +2740,7 @@ CVE-2022-3724
RESERVED
CVE-2022-3723
RESERVED
+ {DSA-5263-1}
- chromium 107.0.5304.87-1
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2022-3722
@@ -4687,8 +5528,7 @@ CVE-2022-42916 (In curl before 7.86.0, the HSTS check could be bypassed to trick
NOTE: Introduced with: https://github.com/curl/curl/commit/7385610d0c74c6a254fea5e4cd6e1d559d848c8c (curl-7_74_0)
NOTE: Enabled by default since: https://github.com/curl/curl/commit/d71ff2b9db566b3f4b2eb29441c2df86715d4339 (curl-7_77_0)
NOTE: Fixed by: https://github.com/curl/curl/commit/53bcf55b4538067e6dc36242168866becb987bb7 (curl-7_86_0)
-CVE-2022-42915 [HTTP proxy double-free]
- RESERVED
+CVE-2022-42915 (curl before 7.86.0 has a double free. If curl is told to use an HTTP p ...)
- curl 7.86.0-1
[bullseye] - curl <not-affected> (Vulnerable code not present)
[buster] - curl <not-affected> (Vulnerable code not present)
@@ -4795,7 +5635,7 @@ CVE-2022-42892
CVE-2022-42891
RESERVED
CVE-2022-42890 (A vulnerability in Batik of Apache XML Graphics allows an attacker to ...)
- {DLA-3169-1}
+ {DSA-5264-1 DLA-3169-1}
- batik 1.16+dfsg-1
NOTE: https://www.openwall.com/lists/oss-security/2022/10/25/3
NOTE: https://issues.apache.org/jira/browse/BATIK-1345
@@ -7561,7 +8401,7 @@ CVE-2022-41706
CVE-2022-41705
RESERVED
CVE-2022-41704 (A vulnerability in Batik of Apache XML Graphics allows an attacker to ...)
- {DLA-3169-1}
+ {DSA-5264-1 DLA-3169-1}
- batik 1.16+dfsg-1
NOTE: https://www.openwall.com/lists/oss-security/2022/10/25/2
NOTE: https://issues.apache.org/jira/browse/BATIK-1338
@@ -39459,7 +40299,7 @@ CVE-2022-29897 (On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin
CVE-2022-29892 (Improper input validation vulnerability in Space of Cybozu Garoon 4.0. ...)
NOT-FOR-US: Cybozu
CVE-2022-29885 (The documentation of Apache Tomcat 10.1.0-M1 to 10.1.0-M14, 10.0.0-M1 ...)
- {DLA-3160-1}
+ {DSA-5265-1 DLA-3160-1}
- tomcat9 9.0.63-1
- tomcat8 <removed>
[stretch] - tomcat8 <postponed> (Minor issue)
@@ -60397,7 +61237,7 @@ CVE-2022-23185
CVE-2022-23184 (In affected Octopus Server versions when the server HTTP and HTTPS bin ...)
NOT-FOR-US: Octopus Server
CVE-2022-23181 (The fix for bug CVE-2020-9484 introduced a time of check, time of use ...)
- {DLA-3160-1}
+ {DSA-5265-1 DLA-3160-1}
- tomcat9 9.0.58-1
- tomcat8 <removed>
[stretch] - tomcat8 <postponed> (Minor issue; local race condition)
@@ -71052,7 +71892,7 @@ CVE-2021-43982 (Delta Electronics CNCSoft Versions 1.01.30 and prior are vulnera
CVE-2021-43981 (mySCADA myPRO: Versions 8.20.0 and prior has a feature to send emails, ...)
NOT-FOR-US: mySCADA myPRO
CVE-2021-43980 (The simplified implementation of blocking reads and writes introduced ...)
- {DLA-3160-1}
+ {DSA-5265-1 DLA-3160-1}
- tomcat9 9.0.62-1
- tomcat8 <removed>
NOTE: https://lists.apache.org/thread/3jjqbsp6j88b198x5rmg99b1qr8ht3g3
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e8034212bf03dfc1a7b295ce424272073de26cc
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6e8034212bf03dfc1a7b295ce424272073de26cc
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221030/83ec4d64/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list