[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Mon Jan 8 20:22:43 GMT 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
d203f450 by security tracker role at 2024-01-08T20:22:17+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,287 @@
+CVE-2024-21747 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2024-21745 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-21744 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2024-21650 (XWiki Platform is a generic wiki platform offering runtime services fo ...)
+	TODO: check
+CVE-2024-21647 (Puma is a web server for Ruby/Rack applications built for parallelism. ...)
+	TODO: check
+CVE-2024-21645 (pyLoad is the free and open-source Download Manager written in pure Py ...)
+	TODO: check
+CVE-2024-21644 (pyLoad is the free and open-source Download Manager written in pure Py ...)
+	TODO: check
+CVE-2024-0322 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.)
+	TODO: check
+CVE-2024-0321 (Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2. ...)
+	TODO: check
+CVE-2024-0308 (A vulnerability was found in Inis up to 2.0.1. It has been rated as cr ...)
+	TODO: check
+CVE-2024-0307 (A vulnerability was found in Kashipara Dynamic Lab Management System u ...)
+	TODO: check
+CVE-2024-0306 (A vulnerability was found in Kashipara Dynamic Lab Management System u ...)
+	TODO: check
+CVE-2024-0305 (A vulnerability was found in Guangzhou Yingke Electronic Technology Nc ...)
+	TODO: check
+CVE-2023-7224 (OpenVPN Connect version 3.0 through 3.4.6 on macOS allows local users  ...)
+	TODO: check
+CVE-2023-6921 (Blind SQL Injection vulnerability in PrestaShow Google Integrator (Pre ...)
+	TODO: check
+CVE-2023-6845 (The CommentTweets WordPress plugin through 0.6 does not have CSRF chec ...)
+	TODO: check
+CVE-2023-6750 (The Clone WordPress plugin before 2.4.3 uses buffer files to store in- ...)
+	TODO: check
+CVE-2023-6631 (PowerSYSTEM Center versions 2020 Update 16 and prior contain a vulnera ...)
+	TODO: check
+CVE-2023-6627 (The WP Go Maps (formerly WP Google Maps) WordPress plugin before 9.0.2 ...)
+	TODO: check
+CVE-2023-6555 (The Email Subscription Popup WordPress plugin before 1.2.20 does not s ...)
+	TODO: check
+CVE-2023-6552 (Lack of "current" GET parameter validation during the action of changi ...)
+	TODO: check
+CVE-2023-6532 (The WP Blogs' Planetarium WordPress plugin through 1.0 does not have C ...)
+	TODO: check
+CVE-2023-6529 (The WP VR WordPress plugin before 8.3.15 does not authorisation and CS ...)
+	TODO: check
+CVE-2023-6528 (The Slider Revolution WordPress plugin before 6.6.19 does not prevent  ...)
+	TODO: check
+CVE-2023-6505 (The Migrate WordPress Website & Backups WordPress plugin before 1.9.3  ...)
+	TODO: check
+CVE-2023-6383 (The Debug Log Manager WordPress plugin before 2.3.0 contains a Directo ...)
+	TODO: check
+CVE-2023-6161 (The WP Crowdfunding WordPress plugin before 2.1.9 does not sanitise an ...)
+	TODO: check
+CVE-2023-6141 (The Essential Real Estate WordPress plugin before 4.4.0 does not apply ...)
+	TODO: check
+CVE-2023-6140 (The Essential Real Estate WordPress plugin before 4.4.0 does not preve ...)
+	TODO: check
+CVE-2023-6139 (The Essential Real Estate WordPress plugin before 4.4.0 does not apply ...)
+	TODO: check
+CVE-2023-6042 (Any unauthenticated user may send e-mail from the site with any title  ...)
+	TODO: check
+CVE-2023-5957 (The Ni Purchase Order(PO) For WooCommerce WordPress plugin through 1.2 ...)
+	TODO: check
+CVE-2023-5911 (The WP Custom Cursors | WordPress Cursor Plugin WordPress plugin throu ...)
+	TODO: check
+CVE-2023-5235 (The Ovic Responsive WPBakery WordPress plugin before 1.2.9 does not li ...)
+	TODO: check
+CVE-2023-5091 (Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver allo ...)
+	TODO: check
+CVE-2023-52271 (The wsftprm.sys kernel driver 2.0.0.0 in Topaz Antifraud allows low-pr ...)
+	TODO: check
+CVE-2023-52225 (Deserialization of Untrusted Data vulnerability in Tagbox Tagbox \u201 ...)
+	TODO: check
+CVE-2023-52222 (Cross-Site Request Forgery (CSRF) vulnerability in Automattic WooComme ...)
+	TODO: check
+CVE-2023-52219 (Deserialization of Untrusted Data vulnerability in Gecka Gecka Terms T ...)
+	TODO: check
+CVE-2023-52218 (Deserialization of Untrusted Data vulnerability in Anton Bond Woocomme ...)
+	TODO: check
+CVE-2023-52216 (Cross-Site Request Forgery (CSRF) vulnerability in Yevhen Kotelnytskyi ...)
+	TODO: check
+CVE-2023-52215 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2023-52213 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2023-52208 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+	TODO: check
+CVE-2023-52207 (Deserialization of Untrusted Data vulnerability in SVNLabs Softwares H ...)
+	TODO: check
+CVE-2023-52206 (Deserialization of Untrusted Data vulnerability in Live Composer Team  ...)
+	TODO: check
+CVE-2023-52205 (Deserialization of Untrusted Data vulnerability in SVNLabs Softwares H ...)
+	TODO: check
+CVE-2023-52204 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2023-52203 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
+	TODO: check
+CVE-2023-52201 (Improper Neutralization of Special Elements used in an SQL Command ('S ...)
+	TODO: check
+CVE-2023-52200 (Cross-Site Request Forgery (CSRF), Deserialization of Untrusted Data v ...)
+	TODO: check
+CVE-2023-52190 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+	TODO: check
+CVE-2023-51701 (fastify-reply-from is a Fastify plugin to forward the current HTTP req ...)
+	TODO: check
+CVE-2023-51508 (Exposure of Sensitive Information to an Unauthorized Actor vulnerabili ...)
+	TODO: check
+CVE-2023-51246 (A Cross Site Scripting (XSS) vulnerability in GetSimple CMS 3.3.16 exi ...)
+	TODO: check
+CVE-2023-50982 (Stud.IP 5.x through 5.3.3 allows XSS with resultant upload of executab ...)
+	TODO: check
+CVE-2023-47890 (pyLoad 0.5.0 is vulnerable to Unrestricted File Upload.)
+	TODO: check
+CVE-2023-47211 (A directory traversal vulnerability exists in the uploadMib functional ...)
+	TODO: check
+CVE-2023-41710 (User-defined script code could be stored for a upsell related shop URL ...)
+	TODO: check
+CVE-2023-39444 (Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing ...)
+	TODO: check
+CVE-2023-39443 (Multiple out-of-bounds write vulnerabilities exist in the LXT2 parsing ...)
+	TODO: check
+CVE-2023-39414 (Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_i ...)
+	TODO: check
+CVE-2023-39413 (Multiple integer underflow vulnerabilities exist in the LXT2 lxt2_rd_i ...)
+	TODO: check
+CVE-2023-39317 (Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_e ...)
+	TODO: check
+CVE-2023-39316 (Multiple integer overflow vulnerabilities exist in the LXT2 num_dict_e ...)
+	TODO: check
+CVE-2023-39275 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	TODO: check
+CVE-2023-39274 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	TODO: check
+CVE-2023-39273 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	TODO: check
+CVE-2023-39272 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	TODO: check
+CVE-2023-39271 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	TODO: check
+CVE-2023-39270 (Multiple integer overflow vulnerabilities exist in the LXT2 facgeometr ...)
+	TODO: check
+CVE-2023-39235 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_p ...)
+	TODO: check
+CVE-2023-39234 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_p ...)
+	TODO: check
+CVE-2023-38657 (An out-of-bounds write vulnerability exists in the LXT2 zlib block dec ...)
+	TODO: check
+CVE-2023-38653 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	TODO: check
+CVE-2023-38652 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	TODO: check
+CVE-2023-38651 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	TODO: check
+CVE-2023-38650 (Multiple integer overflow vulnerabilities exist in the VZT vzt_rd_bloc ...)
+	TODO: check
+CVE-2023-38649 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_g ...)
+	TODO: check
+CVE-2023-38648 (Multiple out-of-bounds write vulnerabilities exist in the VZT vzt_rd_g ...)
+	TODO: check
+CVE-2023-38623 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	TODO: check
+CVE-2023-38622 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	TODO: check
+CVE-2023-38621 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	TODO: check
+CVE-2023-38620 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	TODO: check
+CVE-2023-38619 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	TODO: check
+CVE-2023-38618 (Multiple integer overflow vulnerabilities exist in the VZT facgeometry ...)
+	TODO: check
+CVE-2023-38583 (A stack-based buffer overflow vulnerability exists in the LXT2 lxt2_rd ...)
+	TODO: check
+CVE-2023-37923 (Multiple arbitrary write vulnerabilities exist in the VCD sorted bsear ...)
+	TODO: check
+CVE-2023-37922 (Multiple arbitrary write vulnerabilities exist in the VCD sorted bsear ...)
+	TODO: check
+CVE-2023-37921 (Multiple arbitrary write vulnerabilities exist in the VCD sorted bsear ...)
+	TODO: check
+CVE-2023-37578 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	TODO: check
+CVE-2023-37577 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	TODO: check
+CVE-2023-37576 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	TODO: check
+CVE-2023-37575 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	TODO: check
+CVE-2023-37574 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	TODO: check
+CVE-2023-37573 (Multiple use-after-free vulnerabilities exist in the VCD get_vartoken  ...)
+	TODO: check
+CVE-2023-37447 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	TODO: check
+CVE-2023-37446 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	TODO: check
+CVE-2023-37445 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	TODO: check
+CVE-2023-37444 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	TODO: check
+CVE-2023-37443 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	TODO: check
+CVE-2023-37442 (Multiple out-of-bounds read vulnerabilities exist in the VCD var defin ...)
+	TODO: check
+CVE-2023-37420 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	TODO: check
+CVE-2023-37419 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	TODO: check
+CVE-2023-37418 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	TODO: check
+CVE-2023-37417 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	TODO: check
+CVE-2023-37416 (Multiple out-of-bounds write vulnerabilities exist in the VCD parse_va ...)
+	TODO: check
+CVE-2023-37282 (An out-of-bounds write vulnerability exists in the VZT LZMA_Read dmem  ...)
+	TODO: check
+CVE-2023-36916 (Multiple integer overflow vulnerabilities exist in the FST fstReaderIt ...)
+	TODO: check
+CVE-2023-36915 (Multiple integer overflow vulnerabilities exist in the FST fstReaderIt ...)
+	TODO: check
+CVE-2023-36864 (An integer overflow vulnerability exists in the fstReaderIterBlocks2 t ...)
+	TODO: check
+CVE-2023-36861 (An out-of-bounds write vulnerability exists in the VZT LZMA_read_varin ...)
+	TODO: check
+CVE-2023-36747 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-36746 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-35997 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	TODO: check
+CVE-2023-35996 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	TODO: check
+CVE-2023-35995 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	TODO: check
+CVE-2023-35994 (Multiple improper array index validation vulnerabilities exist in the  ...)
+	TODO: check
+CVE-2023-35992 (An integer overflow vulnerability exists in the FST fstReaderIterBlock ...)
+	TODO: check
+CVE-2023-35989 (An integer overflow vulnerability exists in the LXT2 zlib block alloca ...)
+	TODO: check
+CVE-2023-35970 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-35969 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-35964 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	TODO: check
+CVE-2023-35963 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	TODO: check
+CVE-2023-35962 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	TODO: check
+CVE-2023-35961 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	TODO: check
+CVE-2023-35960 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	TODO: check
+CVE-2023-35959 (Multiple OS command injection vulnerabilities exist in the decompressi ...)
+	TODO: check
+CVE-2023-35958 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-35957 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-35956 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-35955 (Multiple heap-based buffer overflow vulnerabilities exist in the fstRe ...)
+	TODO: check
+CVE-2023-35704 (Multiple stack-based buffer overflow vulnerabilities exist in the FST  ...)
+	TODO: check
+CVE-2023-35703 (Multiple stack-based buffer overflow vulnerabilities exist in the FST  ...)
+	TODO: check
+CVE-2023-35702 (Multiple stack-based buffer overflow vulnerabilities exist in the FST  ...)
+	TODO: check
+CVE-2023-35128 (An integer overflow vulnerability exists in the fstReaderIterBlocks2 t ...)
+	TODO: check
+CVE-2023-35057 (An integer overflow vulnerability exists in the LXT2 lxt2_rd_trace val ...)
+	TODO: check
+CVE-2023-35004 (An integer overflow vulnerability exists in the VZT longest_len value  ...)
+	TODO: check
+CVE-2023-34436 (An out-of-bounds write vulnerability exists in the LXT2 num_time_table ...)
+	TODO: check
+CVE-2023-34087 (An improper array index validation vulnerability exists in the EVCD va ...)
+	TODO: check
+CVE-2023-32650 (An integer overflow vulnerability exists in the FST_BL_GEOM parsing ma ...)
+	TODO: check
+CVE-2018-25095 (The Duplicator WordPress plugin before 1.3.0 does not properly escape  ...)
+	TODO: check
 CVE-2024-22216 (In default installations of Microchip maxView Storage Manager (for Ada ...)
 	NOT-FOR-US: Microchip
 CVE-2024-0304 (A vulnerability has been found in Youke365 up to 1.5.3 and classified  ...)
@@ -42604,16 +42888,16 @@ CVE-2023-29054 (A vulnerability has been identified in SCALANCE X200-4P IRT (All
 	NOT-FOR-US: Siemens
 CVE-2023-29053 (A vulnerability has been identified in JT Open (All versions < V11.3.2 ...)
 	NOT-FOR-US: Siemens
-CVE-2023-29052
-	RESERVED
-CVE-2023-29051
-	RESERVED
-CVE-2023-29050
-	RESERVED
-CVE-2023-29049
-	RESERVED
-CVE-2023-29048
-	RESERVED
+CVE-2023-29052 (Users were able to define disclaimer texts for an upsell shop dialog t ...)
+	TODO: check
+CVE-2023-29051 (User-defined OXMF templates could be used to access a limited part of  ...)
+	TODO: check
+CVE-2023-29050 (The optional "LDAP contacts provider" could be abused by privileged us ...)
+	TODO: check
+CVE-2023-29049 (The "upsell" widget at the portal page could be abused to inject arbit ...)
+	TODO: check
+CVE-2023-29048 (A component for parsing OXMF templates could be abused to execute arbi ...)
+	TODO: check
 CVE-2023-29047 (Imageconverter API endpoints provided methods that were not sufficient ...)
 	NOT-FOR-US: Open-Xchange
 CVE-2023-29046 (Connections to external data sources, like e-mail autoconfiguration, w ...)
@@ -50395,8 +50679,7 @@ CVE-2023-1034 (Path Traversal: '\..\filename' in GitHub repository salesagility/
 	NOT-FOR-US: suitecrm
 CVE-2023-1033 (Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor ...)
 	- froxlor <itp> (bug #581792)
-CVE-2023-1032
-	RESERVED
+CVE-2023-1032 (The Linux kernel io_uring IORING_OP_SOCKET operation contained a doubl ...)
 	- linux 6.1.20-1
 	[bullseye] - linux <not-affected> (Vulnerable code not present)
 	[buster] - linux <not-affected> (Vulnerable code not present)
@@ -87816,8 +88099,7 @@ CVE-2022-38136 (Uncontrolled search path in the Intel(R) oneAPI DPC++/C++ Compil
 	NOT-FOR-US: Intel
 CVE-2022-38099 (Improper input validation in BIOS firmware for some Intel(R) NUC 11 Co ...)
 	NOT-FOR-US: Intel
-CVE-2022-3328
-	RESERVED
+CVE-2022-3328 (Race condition in snap-confine's must_mkdir_and_open_with_perms())
 	{DSA-5292-1 DLA-3215-1}
 	- snapd 2.57.6-1
 	NOTE: https://github.com/snapcore/snapd/commit/6226cdc57052f4b7057d92f2e549aa169e35cd2d (2.57.6)
@@ -99414,8 +99696,7 @@ CVE-2022-2603 (Use after free in Omnibox in Google Chrome prior to 104.0.5112.79
 	{DSA-5201-1}
 	- chromium 104.0.5112.79-1
 	[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2022-2602 [io_uring/af_unix: defer registered files gc to io_uring release]
-	RESERVED
+CVE-2022-2602 (io_uring UAF, Unix SCM garbage collection)
 	{DSA-5257-1 DLA-3173-1}
 	- linux 6.0.3-1
 	[buster] - linux <not-affected> (Vulnerable code not present)
@@ -100076,23 +100357,20 @@ CVE-2022-37025 (An improper privilege management vulnerability in McAfee Securit
 	NOT-FOR-US: McAfee
 CVE-2022-37024 (Zoho ManageEngine OpManager, OpManager Plus, OpManager MSP, Network Co ...)
 	NOT-FOR-US: Zoho ManageEngine
-CVE-2022-2588
-	RESERVED
+CVE-2022-2588 (It was discovered that the cls_route filter implementation in the Linu ...)
 	{DSA-5207-1 DLA-3131-1 DLA-3102-1}
 	- linux 5.18.16-1
 	NOTE: https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
 	NOTE: https://www.openwall.com/lists/oss-security/2022/08/09/6
 CVE-2022-2587 (Out of bounds write in Chrome OS Audio Server in Google Chrome on Chro ...)
 	- chromium <not-affected> (Chrome on Chrome OS)
-CVE-2022-2586
-	RESERVED
+CVE-2022-2586 (It was discovered that a nft object or expression could reference a nf ...)
 	{DSA-5207-1 DLA-3131-1 DLA-3102-1}
 	- linux 5.18.16-1
 	NOTE: https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t
 	NOTE: https://www.openwall.com/lists/oss-security/2022/08/09/5
 	NOTE: https://www.openwall.com/lists/oss-security/2022/08/29/5
-CVE-2022-2585
-	RESERVED
+CVE-2022-2585 (It was discovered that when exec'ing from a non-leader thread, armed P ...)
 	{DSA-5207-1 DLA-3102-1}
 	- linux 5.18.16-1
 	[buster] - linux <not-affected> (Vulnerable code introduced later)
@@ -179442,8 +179720,7 @@ CVE-2021-34683 (An issue was discovered in EXCELLENT INFOTEK CORPORATION (EIC) E
 	NOT-FOR-US: EXCELLENT INFOTEK CORPORATION
 CVE-2021-34682 (Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack agains ...)
 	NOT-FOR-US: Receita Federal IRPF 2021 1.7
-CVE-2021-3600
-	RESERVED
+CVE-2021-3600 (It was discovered that the eBPF implementation in the Linux kernel did ...)
 	{DLA-2785-1}
 	- linux 5.10.19-1
 	[buster] - linux 4.19.208-1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d203f450372e285ccfe320717171a6e43601c35d

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d203f450372e285ccfe320717171a6e43601c35d
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240108/09777e87/attachment.htm>


More information about the debian-security-tracker-commits mailing list