[Git][security-tracker-team/security-tracker][master] Merge Linux CVEs from kernel-sec
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Dec 9 07:18:02 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
c3cac4bc by Salvatore Bonaccorso at 2025-12-09T08:17:27+01:00
Merge Linux CVEs from kernel-sec
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,305 @@
+CVE-2023-53866 [ASoC: soc-compress: Reposition and add pcm_mutex]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/aa9ff6a4955fdba02b54fbc4386db876603703b7 (6.3-rc1)
+CVE-2023-53865 [btrfs: fix warning when putting transaction with qgroups enabled after abort]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/aa84ce8a78a1a5c10cdf9c7a5fb0c999fbc2c8d6 (6.5-rc3)
+CVE-2023-53864 [drm/mxsfb: Disable overlay plane in mxsfb_plane_overlay_atomic_disable()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/aa656d48e871a1b062e1bbf9474d8b831c35074c (6.6-rc1)
+CVE-2023-53863 [netlink: do not hard code device address lenth in fdb dumps]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/aa5406950726e336c5c9585b09799a734b6e77bf (6.5-rc1)
+CVE-2023-53862 [hfs: fix missing hfs_bnode_get() in __hfs_bnode_create]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a9dc087fd3c484fd1ed18c5efb290efaaf44ce03 (6.3-rc1)
+CVE-2023-53861 [ext4: correct grp validation in ext4_mb_good_group]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/a9ce5993a0f5c0887c8a1b4ffa3b8046fbcfdc93 (6.6-rc1)
+CVE-2023-53860 [dm: don't attempt to queue IO under RCU protection]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a9ce385344f916cd1c36a33905e564f5581beae9 (6.6-rc2)
+CVE-2023-53859 [s390/idle: mark arch_cpu_idle() noinstr]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/a9cbc1b471d291c865907542394f1c483b93a811 (6.3-rc1)
+CVE-2023-53858 [tty: serial: samsung_tty: Fix a memory leak in s3c24xx_serial_getclk() in case of error]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a9c09546e903f1068acfa38e1ee18bded7114b37 (6.5-rc1)
+CVE-2023-53857 [bpf: bpf_sk_storage: Fix invalid wait context lockdep report]
+ - linux 6.5.6-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a96a44aba556c42b432929d37d60158aca21ad4c (6.6-rc1)
+CVE-2023-53856 [of: overlay: Call of_changeset_init() early]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ NOTE: https://git.kernel.org/linus/a9515ff4fb142b690a0d2b58782b15903b990dba (6.6-rc1)
+CVE-2023-53855 [net: dsa: ocelot: call dsa_tag_8021q_unregister() under rtnl_lock() on driver remove]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a94c16a2fda010866b8858a386a8bfbeba4f72c5 (6.5-rc6)
+CVE-2023-53854 [ASoC: mediatek: mt8186: Fix use-after-free in driver remove path]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a93d2afd3f77a7331271a0f25c6a11003db69b3c (6.4-rc3)
+CVE-2023-53853 [netlink: annotate accesses to nlk->cb_running]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a939d14919b799e6fff8a9c80296ca229ba2f8a4 (6.4-rc2)
+CVE-2023-53852 [nvme-core: fix memory leak in dhchap_secret_store]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a836ca33c5b07d34dd5347af9f64d25651d12674 (6.5-rc1)
+CVE-2023-53851 [drm/msm/dp: Drop aux devices together with DP controller]
+ - linux 6.4.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a7bfb2ad2184a1fba78be35209b6019aa8cc8d4d (6.5-rc1)
+CVE-2023-53850 [iavf: use internal state to free traffic IRQs]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/a77ed5c5b768e9649be240a2d864e5cd9c6a2015 (6.5-rc3)
+CVE-2023-53849 [drm/msm: fix workqueue leak on bind errors]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/a75b49db6529b2af049eafd938fae888451c3685 (6.4-rc1)
+CVE-2023-53848 [md/raid5-cache: fix a deadlock in r5l_exit_log()]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a705b11b358dee677aad80630e7608b2d5f56691 (6.6-rc1)
+CVE-2023-53847 [usb-storage: alauda: Fix uninit-value in alauda_check_media()]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a6ff6e7a9dd69364547751db0f626a10a6d628d2 (6.5-rc6)
+CVE-2023-53846 [f2fs: fix to do sanity check on direct node in truncate_dnode()]
+ - linux 6.4.11-1
+ NOTE: https://git.kernel.org/linus/a6ec83786ab9f13f25fb18166dee908845713a95 (6.5-rc1)
+CVE-2023-53845 [nilfs2: fix infinite loop in nilfs_mdt_get_block()]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a6a491c048882e7e424d407d32cba0b52d9ef2bf (6.4-rc1)
+CVE-2023-53844 [drm/ttm: Don't leak a resource on swapout move error]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a590f03d8de7c4cb7ce4916dc7f2fd10711faabe (6.5-rc2)
+CVE-2023-53843 [net: openvswitch: reject negative ifindex]
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a552bfa16bab4ce901ee721346a28c4e483f4066 (6.5-rc7)
+CVE-2023-53842 [ASoC: codecs: wcd-mbhc-v2: fix resource leaks on component remove]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a5475829adcc600bc69ee9ff7c9e3e43fb4f8d30 (6.5-rc3)
+CVE-2023-53841 [devlink: report devlink_port_type_warn source device]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a52305a81d6bb74b90b400dfa56455d37872fe4b (6.5-rc1)
+CVE-2023-53840 [usb: early: xhci-dbc: Fix a potential out-of-bound memory access]
+ - linux 6.1.20-1
+ NOTE: https://git.kernel.org/linus/a4a97ab3db5c081eb6e7dba91306adefb461e0bd (6.3-rc1)
+CVE-2023-53839 [dccp: fix data-race around dp->dccps_mss_cache]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a47e598fbd8617967e49d85c49c22f9fc642704c (6.5-rc6)
+CVE-2023-53838 [f2fs: synchronize atomic write aborts]
+ - linux 6.1.20-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a46bebd502fe1a3bd1d22f64cedd93e7e7702693 (6.3-rc1)
+CVE-2023-53837 [drm/msm: fix NULL-deref on snapshot tear down]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a465353b9250802f87b97123e33a17f51277f0b1 (6.4-rc1)
+CVE-2023-53836 [bpf, sockmap: Fix skb refcnt race after locking changes]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a454d84ee20baf7bd7be90721b9821f73c7d23d9 (6.6-rc1)
+CVE-2023-53835 [ext4: don't clear SB_RDONLY when remounting r/w until quota is re-enabled]
+ - linux 6.4.4-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a44be64bbecb15a452496f60db6eacfee2b59c79 (6.4-rc2)
+CVE-2023-53834 [iio: adc: ina2xx: avoid NULL pointer dereference on OF device match]
+ - linux 6.4.11-1
+ [bookworm] - linux 6.1.52-1
+ NOTE: https://git.kernel.org/linus/a41e19cc0d6b6a445a4133170b90271e4a2553dc (6.5-rc6)
+CVE-2023-53833 [drm/i915: Fix NULL ptr deref by checking new_crtc_state]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a41d985902c153c31c616fe183cf2ee331e95ecb (6.4-rc2)
+CVE-2023-53832 [md/raid10: fix null-ptr-deref in raid10_sync_request]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a405c6f0229526160aa3f177f65e20c86fce84c5 (6.4-rc1)
+CVE-2023-53831 [net: read sk->sk_family once in sk_mc_loop()]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/a3e0fdf71bbe031de845e8e08ed7fba49f9c702c (6.6-rc1)
+CVE-2023-53830 [platform/x86: think-lmi: Fix memory leak when showing current settings]
+ - linux 6.1.25-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a3c4c053014585dcf20f4df954791b74d8a8afcd (6.3-rc6)
+CVE-2023-53829 [f2fs: flush inode if atomic file is aborted]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ NOTE: https://git.kernel.org/linus/a3ab55746612247ce3dcaac6de66f5ffc055b9df (6.6-rc1)
+CVE-2023-53828 [Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_add_adv_monitor()]
+ - linux 6.5.3-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a2bcd2b63271a93a695fabbfbf459c603d956d48 (6.6-rc1)
+CVE-2023-53827 [Bluetooth: L2CAP: Fix use-after-free in l2cap_disconnect_{req,rsp}]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a2a9339e1c9deb7e1e079e12e27a0265aea8421a (6.3-rc7)
+CVE-2023-53826 [ubi: Fix UAF wear-leveling entry in eraseblk_count_seq_show()]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a240bc5c43130c6aa50831d7caaa02a1d84e1bce (6.3-rc1)
+CVE-2023-53825 [kcm: Fix error handling for SOCK_DGRAM in kcm_sendmsg().]
+ - linux 6.5.6-1
+ [bookworm] - linux 6.1.55-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/a22730b1b4bf437c6bbfdeff5feddf54be4aeada (6.6-rc2)
+CVE-2023-53824 [netlink: annotate lockless accesses to nlk->max_recvmsg_len]
+ - linux 6.1.25-1
+ [bullseye] - linux 5.10.218-1
+ NOTE: https://git.kernel.org/linus/a1865f2e7d10dde00d35a2122b38d2e469ae67ed (6.3-rc6)
+CVE-2023-53823 [block/rq_qos: protect rq_qos apis with a new lock]
+ - linux 6.4.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a13bd91be22318768d55470cbc0b0f4488ef9edf (6.5-rc1)
+CVE-2023-53822 [wifi: ath11k: Ignore frags from uninitialized peer in dp.]
+ - linux 6.3.7-1
+ [bookworm] - linux 6.1.37-1
+ NOTE: https://git.kernel.org/linus/a06bfb3c9f69f303692cdae87bc0899d2ae8b2a6 (6.4-rc1)
+CVE-2023-53821 [ip6_vti: fix slab-use-after-free in decode_session6]
+ - linux 6.4.13-1
+ [bookworm] - linux 6.1.52-1
+ [bullseye] - linux 5.10.197-1
+ NOTE: https://git.kernel.org/linus/9fd41f1ba638938c9a1195d09bc6fa3be2712f25 (6.5-rc7)
+CVE-2023-53820 [loop: loop_set_status_from_info() check before assignment]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/9f6ad5d533d1c71e51bdd06a5712c4fbc8768dfa (6.3-rc1)
+CVE-2022-50679 [i40e: Fix DMA mappings leak]
+ - linux 6.0.6-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/aae425efdfd1b1d8452260a3cb49344ebf20b1f5 (6.1-rc2)
+CVE-2022-50678 [wifi: brcmfmac: fix invalid address access when enabling SCAN log level]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/aa666b68e73fc06d83c070d96180b9010cf5a960 (6.1-rc1)
+CVE-2022-50677 [ipmi: fix use after free in _ipmi_destroy_user()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a92ce570c81dc0feaeb12a429b4bc65686d17967 (6.2-rc1)
+CVE-2022-50676 [net: rds: don't hold sock lock when cancelling work from rds_tcp_reset_callbacks()]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/a91b750fd6629354460282bbf5146c01b05c4859 (6.1-rc1)
+CVE-2022-50675 [arm64: mte: Avoid setting PG_mte_tagged if no tags cleared or restored]
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a8e5e5146ad08d794c58252bab00b261045ef16d (6.1-rc1)
+CVE-2022-50674 [riscv: vdso: fix NULL deference in vdso_join_timens() when vfork]
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a8616d2dc193b6becc36b5f3cfeaa9ac7a5762f9 (6.1-rc1)
+CVE-2022-50673 [ext4: fix use-after-free in ext4_orphan_cleanup]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a71248b1accb2b42e4980afef4fa4a27fa0e36f5 (6.2-rc1)
+CVE-2022-50672 [mailbox: zynq-ipi: fix error handling while device_register() fails]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a6792a0cdef0b1c2d77920246283a72537e60e94 (6.2-rc1)
+CVE-2022-50671 [RDMA/rxe: Fix "kernel NULL pointer dereference" error]
+ - linux 6.0.3-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/a625ca30eff806395175ebad3ac1399014bdb280 (6.1-rc1)
+CVE-2022-50670 [mmc: omap_hsmmc: fix return value check of mmc_add_host()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a525cad241c339ca00bf7ebf03c5180f2a9b767c (6.2-rc1)
+CVE-2022-50669 [misc: ocxl: fix possible name leak in ocxl_file_register_afu()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a4cb1004aeed2ab893a058fad00a5b41a12c4691 (6.2-rc1)
+CVE-2022-50668 [ext4: fix deadlock due to mbcache entry corruption]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a44e84a9b7764c72896f7241a0ec9ac7e7ef38dd (6.2-rc1)
+CVE-2022-50667 [drm/vmwgfx: Fix memory leak in vmw_mksstat_add_ioctl()]
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a40c7f61d12fbd1e785e59140b9efd57127c0c33 (6.1-rc1)
+CVE-2022-50666 [RDMA/siw: Fix QP destroy to wait for all references dropped.]
+ - linux 6.0.3-1
+ NOTE: https://git.kernel.org/linus/a3c278807a459e6f50afee6971cabe74cccfb490 (6.1-rc1)
+CVE-2022-50665 [wifi: ath11k: fix failed to find the peer with peer_id 0 when disconnected]
+ - linux 6.0.3-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a20ed60bb357776301c2dad7b4a4f0db97e143e9 (6.1-rc1)
+CVE-2022-50664 [media: dvb-frontends: fix leak of memory fw]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a15fe8d9f1bf460a804bcf18a890bfd2cf0d5caa (6.2-rc1)
+CVE-2022-50663 [net: stmmac: fix possible memory leak in stmmac_dvr_probe()]
+ - linux 6.1.4-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/a137f3f27f9290933fe7e40e6dc8a445781c31a2 (6.2-rc1)
+CVE-2022-50662 [RDMA/hns: fix memory leak in hns_roce_alloc_mr()]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/a115aa00b18f7b8982b8f458149632caf64a862a (6.2-rc1)
+CVE-2022-50661 [seccomp: Move copy_seccomp() to no failure path.]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.191-1
+ NOTE: https://git.kernel.org/linus/a1140cb215fa13dcec06d12ba0c3ee105633b7c4 (6.2-rc1)
+CVE-2022-50660 [wifi: ipw2200: fix memory leak in ipw_wdev_init()]
+ - linux 6.1.20-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/9fe21dc626117fb44a8eb393713a86a620128ce3 (6.3-rc1)
+CVE-2022-50659 [hwrng: geode - Fix PCI device refcount leak]
+ - linux 6.1.4-1
+ [bullseye] - linux 5.10.178-1
+ NOTE: https://git.kernel.org/linus/9f6ec8dc574efb7f4f3d7ee9cd59ae307e78f445 (6.2-rc1)
+CVE-2022-50658 [cpufreq: qcom: fix memory leak in error path]
+ - linux 6.0.6-1
+ [bullseye] - linux 5.10.158-1
+ NOTE: https://git.kernel.org/linus/9f42cf54403a42cb092636804d2628d8ecf71e75 (6.1-rc2)
+CVE-2022-50657 [riscv: mm: add missing memcpy in kasan_init]
+ - linux 6.0.7-1
+ [bullseye] - linux <not-affected> (Vulnerable code not present)
+ NOTE: https://git.kernel.org/linus/9f2ac64d6ca60db99132e08628ac2899f956a0ec (6.1-rc3)
CVE-2023-53819 [amdgpu: validate offset_in_bo of drm_amdgpu_gem_va]
- linux 6.4.4-1
[bookworm] - linux 6.1.52-1
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c3cac4bcdb40752de2eb104d54cb06d353138611
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c3cac4bcdb40752de2eb104d54cb06d353138611
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20251209/911781f2/attachment.htm>
More information about the debian-security-tracker-commits
mailing list