[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Jun 20 14:41:03 BST 2024



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
a9b4fc5d by Salvatore Bonaccorso at 2024-06-20T15:40:18+02:00
Merge Linux CVEs from kernel-sec

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,314 @@
+CVE-2023-52883 [drm/amdgpu: Fix possible null pointer dereference]
+	- linux 6.5.10-1
+	[bookworm] - linux <not-affected> (Vulnerable code not present)
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/51b79f33817544e3b4df838d86e8e8e4388ff684 (6.6-rc7)
+CVE-2022-48771 [drm/vmwgfx: Fix stale file descriptors on failed usercopy]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/a0f90c8815706981c483a652a6aefca51a5e191c (5.17-rc2)
+CVE-2022-48770 [bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b992f01e66150fc5e90be4a96f5eb8e634c8249e (5.17-rc2)
+CVE-2022-48769 [efi: runtime: avoid EFIv2 runtime services on Apple x86 machines]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/f5390cd0b43c2e54c7cf5506c7da4a37c5cef746 (5.17-rc2)
+CVE-2022-48768 [tracing/histogram: Fix a potential memory leak for kstrdup()]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/e629e7b525a179e29d53463d992bdee759c950fb (5.17-rc2)
+CVE-2022-48767 [ceph: properly put ceph_string reference after async create attempt]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/932a9b5870d38b87ba0a9923c804b1af7d3605b9 (5.17-rc2)
+CVE-2022-48766 [drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU.]
+	- linux 5.16.7-1
+	NOTE: https://git.kernel.org/linus/25f1488bdbba63415239ff301fe61a8546140d9f (5.17-rc2)
+CVE-2022-48765 [KVM: LAPIC: Also cancel preemption timer during SET_LAPIC]
+	- linux 5.16.7-1
+	NOTE: https://git.kernel.org/linus/35fe7cfbab2e81f1afb23fc4212210b1de6d9633 (5.17-rc2)
+CVE-2022-48764 [KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}]
+	- linux 5.16.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/811f95ff95270e6048197821434d9301e3d7f07c (5.17-rc2)
+CVE-2022-48763 [KVM: x86: Forcibly leave nested virt when SMM state is toggled]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/f7e570780efc5cec9b2ed1e0472a7da14e864fdb (5.17-rc2)
+CVE-2022-48762 [arm64: extable: fix load_unaligned_zeropad() reg indices]
+	- linux 5.16.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3758a6c74e08bdc15ccccd6872a6ad37d165239a (5.17-rc2)
+CVE-2022-48761 [usb: xhci-plat: fix crash when suspend if remote wake enable]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/9df478463d9feb90dae24f183383961cf123a0ec (5.17-rc2)
+CVE-2022-48760 [USB: core: Fix hang in usb_kill_urb by adding memory barriers]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/26fbe9772b8c459687930511444ce443011f86bf (5.17-rc2)
+CVE-2022-48759 [rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/b7fb2dad571d1e21173c06cef0bced77b323990a (5.17-rc2)
+CVE-2022-48758 [scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/847f9ea4c5186fdb7b84297e3eeed9e340e83fce (5.17-rc2)
+CVE-2022-48757 [net: fix information leakage in /proc/net/ptype]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/47934e06b65637c88a762d9c98329ae6e3238888 (5.17-rc2)
+CVE-2022-48756 [drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/5e761a2287234bc402ba7ef07129f5103bcd775c (5.17-rc2)
+CVE-2022-48755 [powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/3f5f766d5f7f95a69a630da3544a1a0cee1cdddf (5.17-rc2)
+CVE-2022-48754 [phylib: fix potential use-after-free]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/cbda1b16687580d5beee38273f6241ae3725960c (5.17-rc2)
+CVE-2022-48753 [block: fix memory leak in disk_register_independent_access_ranges]
+	- linux 5.16.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/83114df32ae779df57e0af99a8ba6c3968b2ba3d (5.17-rc2)
+CVE-2022-48752 [powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/fb6433b48a178d4672cb26632454ee0b21056eaa (5.17-rc2)
+CVE-2022-48751 [net/smc: Transitional solution for clcsock race issue]
+	- linux 5.16.7-1
+	NOTE: https://git.kernel.org/linus/c0bf3d8a943b6f2e912b7c1de03e2ef28e76f760 (5.17-rc2)
+CVE-2022-48750 [hwmon: (nct6775) Fix crash in clear_caseopen]
+	- linux 5.16.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/79da533d3cc717ccc05ddbd3190da8a72bc2408b (5.17-rc2)
+CVE-2022-48749 [drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/170b22234d5495f5e0844246e23f004639ee89ba (5.17-rc2)
+CVE-2022-48748 [net: bridge: vlan: fix memory leak in __allowed_ingress]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/fd20d9738395cf8e27d0a17eba34169699fccdff (5.17-rc2)
+CVE-2022-48747 [block: Fix wrong offset in bio_truncate()]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/3ee859e384d453d6ac68bfd5971f630d9fa46ad3 (5.17-rc1)
+CVE-2022-48746 [net/mlx5e: Fix handling of wrong devices during bond netevent]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/ec41332e02bd0acf1f24206867bb6a02f5877a62 (5.17-rc3)
+CVE-2022-48745 [net/mlx5: Use del_timer_sync in fw reset flow of halting poll]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/3c5193a87b0fea090aa3f769d020337662d87b5e (5.17-rc3)
+CVE-2022-48744 [net/mlx5e: Avoid field-overflowing memcpy()]
+	- linux 5.16.7-1
+	NOTE: https://git.kernel.org/linus/ad5185735f7dab342fdd0dd41044da4c9ccfef67 (5.17-rc3)
+CVE-2022-48743 [net: amd-xgbe: Fix skb data length underflow]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/5aac9108a180fc06e28d4e7fb00247ce603b72ee (5.17-rc3)
+CVE-2022-48742 [rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/c6f6f2444bdbe0079e41914a35081530d0409963 (5.17-rc3)
+CVE-2022-48741 [ovl: fix NULL pointer dereference in copy up warning]
+	- linux 5.16.7-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4ee7e4a6c9b298da44029ed9ec8ed23ae49cc209 (5.17-rc3)
+CVE-2022-48740 [selinux: fix double free of cond_list on error paths]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/186edf7e368c40d06cf727a1ad14698ea67b74ad (5.17-rc3)
+CVE-2022-48739 [ASoC: hdmi-codec: Fix OOB memory accesses]
+	- linux 5.16.10-1
+	NOTE: https://git.kernel.org/linus/06feec6005c9d9500cd286ec440aabf8b2ddd94d (5.17-rc3)
+CVE-2022-48738 [ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0 (5.17-rc3)
+CVE-2022-48737 [ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/4f1e50d6a9cf9c1b8c859d449b5031cacfa8404e (5.17-rc3)
+CVE-2022-48736 [ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/4cf28e9ae6e2e11a044be1bcbcfa1b0d8675fe4d (5.17-rc3)
+CVE-2022-48735 [ALSA: hda: Fix UAF of leds class devs at unbinding]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/549f8ffc7b2f7561bea7f90930b6c5104318e87b (5.17-rc3)
+CVE-2022-48734 [btrfs: fix deadlock between quota disable and qgroup rescan worker]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/e804861bd4e69cc5fe1053eedcb024982dde8e48 (5.17-rc3)
+CVE-2022-48733 [btrfs: fix use-after-free after failure to create a snapshot]
+	- linux 5.16.10-1
+	NOTE: https://git.kernel.org/linus/28b21c558a3753171097193b6f6602a94169093a (5.17-rc3)
+CVE-2022-48732 [drm/nouveau: fix off by one in BIOS boundary checking]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/1b777d4d9e383d2744fc9b3a09af6ec1893c8b1a (5.17-rc3)
+CVE-2022-48731 [mm/kmemleak: avoid scanning potential huge holes]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/c10a0f877fe007021d70f9cada240f42adc2b5db (5.17-rc3)
+CVE-2022-48730 [dma-buf: heaps: Fix potential spectre v1 gadget]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/92c4cfaee6872038563c5b6f2e8e613f9d84d47d (5.17-rc3)
+CVE-2022-48729 [IB/hfi1: Fix panic with larger ipoib send_queue_size]
+	- linux 5.16.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/8c83d39cc730378bbac64d67a551897b203a606e (5.17-rc3)
+CVE-2022-48728 [IB/hfi1: Fix AIP early init panic]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/5f8f55b92edd621f056bdf09e572092849fabd83 (5.17-rc3)
+CVE-2022-48727 [KVM: arm64: Avoid consuming a stale esr value when SError occur]
+	- linux 5.16.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1c71dbc8a179d99dd9bb7e7fc1888db613cf85de (5.17-rc3)
+CVE-2022-48726 [RDMA/ucma: Protect mc during concurrent multicast leaves]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/36e8169ec973359f671f9ec7213547059cae972e (5.17-rc3)
+CVE-2022-48725 [RDMA/siw: Fix refcounting leak in siw_create_qp()]
+	- linux 5.16.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/a75badebfdc0b3823054bedf112edb54d6357c75 (5.17-rc3)
+CVE-2022-48724 [iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/99e675d473eb8cf2deac1376a0f840222fc1adcf (5.17-rc3)
+CVE-2022-48723 [spi: uniphier: fix reference count leak in uniphier_spi_probe()]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/37c2c83ca4f1ef4b6908181ac98e18360af89b42 (5.17-rc3)
+CVE-2022-48722 [net: ieee802154: ca8210: Stop leaking skb's]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/621b24b09eb61c63f262da0c9c5f0e93348897e5 (5.17-rc3)
+CVE-2022-48721 [net/smc: Forward wakeup to smc socket waitqueue after fallback]
+	- linux 5.16.10-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/341adeec9adad0874f29a0a1af35638207352a39 (5.17-rc3)
+CVE-2022-48720 [net: macsec: Fix offload support for NETDEV_UNREGISTER event]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/9cef24c8b76c1f6effe499d2f131807c90f7ce9a (5.17-rc3)
+CVE-2022-48719 [net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work]
+	- linux 5.16.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/4a81f6da9cb2d1ef911131a6fd8bd15cb61fc772 (5.17-rc3)
+CVE-2022-48718 [drm: mxsfb: Fix NULL pointer dereference]
+	- linux 5.16.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/622c9a3a7868e1eeca39c55305ca3ebec4742b64 (5.17-rc3)
+CVE-2022-48717 [ASoC: max9759: fix underflow in speaker_gain_control_put()]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/4c907bcd9dcd233da6707059d777ab389dcbd964 (5.17-rc3)
+CVE-2022-48716 [ASoC: codecs: wcd938x: fix incorrect used of portid]
+	- linux 5.16.10-1
+	[bullseye] - linux <not-affected> (Vulnerable code not present)
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7 (5.17-rc3)
+CVE-2022-48715 [scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/936bd03405fc83ba039d42bc93ffd4b88418f1d3 (5.17-rc3)
+CVE-2022-48714 [bpf: Use VM_MAP instead of VM_ALLOC for ringbuf]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/b293dcc473d22a62dc6d78de2b15e4f49515db56 (5.17-rc3)
+CVE-2022-48713 [perf/x86/intel/pt: Fix crash with stop filters in single-range mode]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux <not-affected> (Vulnerable code not present)
+	NOTE: https://git.kernel.org/linus/1d9093457b243061a9bba23543c38726e864a643 (5.17-rc3)
+CVE-2022-48712 [ext4: fix error handling in ext4_fc_record_modified_inode()]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	NOTE: https://git.kernel.org/linus/cdce59a1549190b66f8e3fe465c2b2f714b98a94 (5.17-rc3)
+CVE-2022-48711 [tipc: improve size validations for received domain records]
+	- linux 5.16.10-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/9aa422ad326634b76309e8ff342c246800621216 (5.17-rc4)
+CVE-2021-47620 [Bluetooth: refactor malicious adv data check]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/899663be5e75dc0174dc8bda0b5e6826edf0b29a (5.17-rc1)
+CVE-2021-47619 [i40e: Fix queues reservation for XDP]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/92947844b8beee988c0ce17082b705c2f75f0742 (5.17-rc2)
+CVE-2021-47618 [ARM: 9170/1: fix panic when kasan and kprobe are enabled]
+	- linux 5.16.7-1
+	NOTE: https://git.kernel.org/linus/8b59b0a53c840921b625378f137e88adfa87647e (5.17-rc2)
+CVE-2021-47617 [PCI: pciehp: Fix infinite loop in IRQ handler upon power fault]
+	- linux 5.16.7-1
+	[bullseye] - linux 5.10.103-1
+	[buster] - linux 4.19.235-1
+	NOTE: https://git.kernel.org/linus/23584c1ed3e15a6f4bfab8dc5a88d94ab929ee12 (5.17-rc1)
+CVE-2021-4439 [isdn: cpai: check ctr->cnr to avoid array index out of bound]
+	- linux 5.14.16-1
+	[bullseye] - linux 5.10.84-1
+	[buster] - linux 4.19.232-1
+	NOTE: https://git.kernel.org/linus/1f3e2e97c003f80c4b087092b225c8787ff91e4d (5.15-rc6)
 CVE-2024-6179 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)
 	NOT-FOR-US: LG Electronics
 CVE-2024-6178 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a9b4fc5d85fdc14b595da9385935db2544051b82

-- 
This project does not include diff previews in email notifications.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a9b4fc5d85fdc14b595da9385935db2544051b82
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240620/f6b5739d/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list