[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Feb 13 08:12:16 GMT 2025
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
964f262f by security tracker role at 2025-02-13T08:12:10+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,3 +1,223 @@
+CVE-2025-25286 (Crayfish is a collection of Islandora 8 microservices, one of which, H ...)
+ TODO: check
+CVE-2025-20097 (Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP ...)
+ TODO: check
+CVE-2025-1229 (A vulnerability classified as critical was found in olajowon Loggrove ...)
+ TODO: check
+CVE-2025-1228 (A vulnerability classified as problematic has been found in olajowon L ...)
+ TODO: check
+CVE-2025-1227 (A vulnerability was found in ywoa up to 2024.07.03. It has been rated ...)
+ TODO: check
+CVE-2025-1226 (A vulnerability was found in ywoa up to 2024.07.03. It has been declar ...)
+ TODO: check
+CVE-2025-1198 (An issue discovered in GitLab CE/EE affecting all versions from 16.11 ...)
+ TODO: check
+CVE-2025-1070 (CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability ...)
+ TODO: check
+CVE-2025-1060 (CWE-319: Cleartext Transmission of Sensitive Information vulnerability ...)
+ TODO: check
+CVE-2025-1059 (CWE-770: Allocation of Resources Without Limits or Throttling vulnerab ...)
+ TODO: check
+CVE-2025-1058 (CWE-494: Download of Code Without Integrity Check vulnerability exists ...)
+ TODO: check
+CVE-2025-0896 (Orthanc server prior to version 1.5.8 does not enable basic authentica ...)
+ TODO: check
+CVE-2025-0837 (The Puzzles theme for WordPress is vulnerable to Stored Cross-Site Scr ...)
+ TODO: check
+CVE-2025-0816 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+ TODO: check
+CVE-2025-0815 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+ TODO: check
+CVE-2025-0814 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+ TODO: check
+CVE-2025-0692 (The Simple Video Management System WordPress plugin through 1.0.4 does ...)
+ TODO: check
+CVE-2025-0661 (The DethemeKit For Elementor plugin for WordPress is vulnerable to Inf ...)
+ TODO: check
+CVE-2025-0327 (CWE-269: Improper Privilege Management vulnerability exists for two se ...)
+ TODO: check
+CVE-2025-0113 (A problem with the network isolation mechanism of the Palo Alto Networ ...)
+ TODO: check
+CVE-2025-0111 (An authenticated file read vulnerability in the Palo Alto Networks PAN ...)
+ TODO: check
+CVE-2025-0110 (A command injection vulnerability in the Palo Alto Networks PAN-OS Ope ...)
+ TODO: check
+CVE-2025-0109 (An unauthenticated file deletion vulnerability in the Palo Alto Networ ...)
+ TODO: check
+CVE-2025-0108 (An authentication bypass in the Palo Alto Networks PAN-OS software ena ...)
+ TODO: check
+CVE-2024-8266 (An issue was discovered in GitLab CE/EE affecting all versions startin ...)
+ TODO: check
+CVE-2024-7102 (An issue was discovered in GitLab CE/EE affecting all versions startin ...)
+ TODO: check
+CVE-2024-57605 (Cross Site Scripting vulnerability in Daylight Studio Fuel CMS v.1.5.2 ...)
+ TODO: check
+CVE-2024-57604 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to e ...)
+ TODO: check
+CVE-2024-57603 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to e ...)
+ TODO: check
+CVE-2024-57602 (An issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote a ...)
+ TODO: check
+CVE-2024-57601 (Cross Site Scripting vulnerability in Alex Tselegidis EasyAppointments ...)
+ TODO: check
+CVE-2024-56940 (An issue in the profile image upload function of LearnDash v6.7.1 allo ...)
+ TODO: check
+CVE-2024-56939 (LearnDash v6.7.1 was discovered to contain a stored cross-site scripti ...)
+ TODO: check
+CVE-2024-56938 (LearnDash v6.7.1 was discovered to contain a stored cross-site scripti ...)
+ TODO: check
+CVE-2024-51440 (An issue in Nothing Tech Nothing OS v.2.6 allows a local attacker to e ...)
+ TODO: check
+CVE-2024-51376 (Directory Traversal vulnerability in yeqifu carRental v.1.0 allows a r ...)
+ TODO: check
+CVE-2024-51123 (An issue in Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240 ...)
+ TODO: check
+CVE-2024-51122 (Cross Site Scripting vulnerability in Zertificon Z1 SecureMail Z1 Cert ...)
+ TODO: check
+CVE-2024-47266 (Improper limitation of a pathname to a restricted directory ('Path Tra ...)
+ TODO: check
+CVE-2024-47265 (Improper limitation of a pathname to a restricted directory ('Path Tra ...)
+ TODO: check
+CVE-2024-47264 (Improper limitation of a pathname to a restricted directory ('Path Tra ...)
+ TODO: check
+CVE-2024-47006 (Uncontrolled search path for the Intel(R) RealSense D400 Series Univer ...)
+ TODO: check
+CVE-2024-46923 (An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, ...)
+ TODO: check
+CVE-2024-46922 (An issue was discovered in Samsung Mobile Processor Exynos 1480 and 24 ...)
+ TODO: check
+CVE-2024-42492 (Uncontrolled search path element in some BIOS and System Firmware Upda ...)
+ TODO: check
+CVE-2024-42419 (Incorrect default permissions for some Intel(R) GPA and Intel(R) GPA F ...)
+ TODO: check
+CVE-2024-42410 (Improper input validation in some Intel(R) Graphics Drivers may allow ...)
+ TODO: check
+CVE-2024-42405 (Uncontrolled search path for some Intel(R) Quartus(R) Prime Software b ...)
+ TODO: check
+CVE-2024-41934 (Improper access control in some Intel(R) GPA software before version 2 ...)
+ TODO: check
+CVE-2024-41917 (Time-of-check time-of-use race condition for some Intel(R) Battery Lif ...)
+ TODO: check
+CVE-2024-41168 (Use after free in some Intel(R) PROSet/Wireless WiFi and Killer\xe2\u2 ...)
+ TODO: check
+CVE-2024-41166 (Stack-based buffer overflow in some Intel(R) PROSet/Wireless WiFi and ...)
+ TODO: check
+CVE-2024-40887 (Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\xe2\u2 ...)
+ TODO: check
+CVE-2024-39813 (Uncontrolled search path for some EPCT software before version 1.42.8. ...)
+ TODO: check
+CVE-2024-39805 (Insufficient verification of data authenticity in some Intel(R) DSA so ...)
+ TODO: check
+CVE-2024-39797 (Improper access control in some drivers for Intel(R) Ethernet Connecti ...)
+ TODO: check
+CVE-2024-39779 (Stack-based buffer overflow in some drivers for Intel(R) Ethernet Conn ...)
+ TODO: check
+CVE-2024-39606 (Improper input validation in some Intel(R) PROSet/Wireless WiFi and Ki ...)
+ TODO: check
+CVE-2024-39372 (Uncontrolled search path for the Intel(R) XTU software for Windows bef ...)
+ TODO: check
+CVE-2024-39365 (Uncontrolled search path for the FPGA Support Package for the Intel(R) ...)
+ TODO: check
+CVE-2024-39356 (NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi and Kil ...)
+ TODO: check
+CVE-2024-39286 (Incorrect execution-assigned permissions in the Linux kernel mode driv ...)
+ TODO: check
+CVE-2024-39284 (Uncontrolled search path for some Intel(R) Advisor software before ver ...)
+ TODO: check
+CVE-2024-39271 (Improper restriction of communication channel to intended endpoints in ...)
+ TODO: check
+CVE-2024-38310 (Improper access control in some Intel(R) Graphics Driver software inst ...)
+ TODO: check
+CVE-2024-38307 (Improper input validation in the firmware for some Intel(R) AMT and In ...)
+ TODO: check
+CVE-2024-37355 (Improper access control in some Intel(R) Graphics software may allow a ...)
+ TODO: check
+CVE-2024-36291 (Uncontrolled search path for some Intel(R) Chipset Software Installati ...)
+ TODO: check
+CVE-2024-36285 (Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\xe2\u2 ...)
+ TODO: check
+CVE-2024-36283 (Uncontrolled search path for the Intel(R) Thread Director Visualizer s ...)
+ TODO: check
+CVE-2024-36280 (Uncontrolled search path for some Intel(R) High Level Synthesis Compil ...)
+ TODO: check
+CVE-2024-36274 (Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver for Int ...)
+ TODO: check
+CVE-2024-36262 (Race condition in some Intel(R) System Security Report and System Reso ...)
+ TODO: check
+CVE-2024-34521 (A directory traversal vulnerability exists in the Mavenir SCE Applicat ...)
+ TODO: check
+CVE-2024-34520 (An authorization bypass vulnerability exists in the Mavenir SCE Applic ...)
+ TODO: check
+CVE-2024-32942 (Incorrect default permissions for some Intel(R) DSA installer for Wind ...)
+ TODO: check
+CVE-2024-32941 (NULL pointer dereference for some Intel(R) MLC software before version ...)
+ TODO: check
+CVE-2024-32938 (Uncontrolled search path for some Intel(R) MPI Library for Windows sof ...)
+ TODO: check
+CVE-2024-31858 (Out-of-bounds write for some Intel(R) QuickAssist Technology software ...)
+ TODO: check
+CVE-2024-31155 (Improper buffer restrictions in the UEFI firmware for some Intel(R) Pr ...)
+ TODO: check
+CVE-2024-31153 (Improper input validation for some Intel(R) QuickAssist Technology sof ...)
+ TODO: check
+CVE-2024-30211 (Improper access control in some Intel(R) ME driver pack installer engi ...)
+ TODO: check
+CVE-2024-29223 (Uncontrolled search path for some Intel(R) QuickAssist Technology soft ...)
+ TODO: check
+CVE-2024-26021 (Improper initialization in the firmware for some Intel(R) AMT and Inte ...)
+ TODO: check
+CVE-2024-25571 (Improper input validation in some Intel(R) SPS firmware before SPS_E5_ ...)
+ TODO: check
+CVE-2024-24852 (Uncontrolled search path in some Intel(R) Ethernet Adapter Complete Dr ...)
+ TODO: check
+CVE-2024-21859 (Improper buffer restrictions in the UEFI firmware for some Intel(R) Pr ...)
+ TODO: check
+CVE-2024-21830 (Uncontrolled search path in some Intel(R) VPL software before version ...)
+ TODO: check
+CVE-2024-13770 (The Puzzles | WP Magazine / Review with Store WordPress Theme + RTL th ...)
+ TODO: check
+CVE-2024-13644 (The DethemeKit For Elementor plugin for WordPress is vulnerable to Sto ...)
+ TODO: check
+CVE-2024-13346 (The Avada | Website Builder For WordPress & WooCommerce theme for Word ...)
+ TODO: check
+CVE-2024-13345 (The Avada Builder plugin for WordPress is vulnerable to arbitrary shor ...)
+ TODO: check
+CVE-2024-13229 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin ...)
+ TODO: check
+CVE-2024-13227 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin ...)
+ TODO: check
+CVE-2024-13125 (The Everest Forms WordPress plugin before 3.0.8.1 does not sanitise a ...)
+ TODO: check
+CVE-2024-13121 (The Paid Membership Plugin, Ecommerce, User Registration Form, Login F ...)
+ TODO: check
+CVE-2024-13120 (The Paid Membership Plugin, Ecommerce, User Registration Form, Login F ...)
+ TODO: check
+CVE-2024-13119 (The Paid Membership Plugin, Ecommerce, User Registration Form, Login F ...)
+ TODO: check
+CVE-2024-12673 (An improper privilege vulnerability was reported in a BIOS customizati ...)
+ TODO: check
+CVE-2024-12586 (The Chalet-Montagne.com Tools WordPress plugin through 2.7.8 does not ...)
+ TODO: check
+CVE-2024-10763 (The Campress theme for WordPress is vulnerable to Local File Inclusion ...)
+ TODO: check
+CVE-2024-10083 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+ TODO: check
+CVE-2023-49618 (Improper buffer restrictions in some Intel(R) System Security Report a ...)
+ TODO: check
+CVE-2023-49615 (Improper input validation in some Intel(R) System Security Report and ...)
+ TODO: check
+CVE-2023-49603 (Race condition in some Intel(R) System Security Report and System Reso ...)
+ TODO: check
+CVE-2023-48366 (Race condition in some Intel(R) System Security Report and System Reso ...)
+ TODO: check
+CVE-2023-48267 (Improper buffer restrictions in some Intel(R) System Security Report a ...)
+ TODO: check
+CVE-2023-32277 (Untrusted Pointer Dereference in I/O subsystem for some Intel(R) QAT s ...)
+ TODO: check
+CVE-2023-31276 (Heap-based buffer overflow in BMC Firmware for the Intel(R) Server Boa ...)
+ TODO: check
+CVE-2023-29164 (Improper access control in BMC Firmware for the Intel(R) Server Board ...)
+ TODO: check
CVE-2025-1247
NOT-FOR-US: Quarkus
CVE-2025-26378 (A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua in Q- ...)
@@ -294,62 +514,62 @@ CVE-2024-57951 (In the Linux kernel, the following vulnerability has been resolv
NOTE: https://git.kernel.org/linus/2f8dea1692eef2b7ba6a256246ed82c365fdc686 (6.13)
CVE-2025-26467
- cassandra <itp> (bug #585905)
-CVE-2024-31068
+CVE-2024-31068 (Improper Finite State Machines (FSMs) in Hardware Logic for some Intel ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-36293
+CVE-2024-36293 (Improper access control in the EDECCSSA user leaf function for some In ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28047
+CVE-2024-28047 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-31157
+CVE-2024-31157 (Improper initialization in UEFI firmware OutOfBandXML module in some I ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39279
+CVE-2024-39279 (Insufficient granularity of access control in UEFI firmware in some In ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28127
+CVE-2024-28127 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-29214
+CVE-2024-29214 (Improper input validation in UEFI firmware CseVariableStorageSmm for s ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-24582
+CVE-2024-24582 (Improper input validation in XmlCli feature for UEFI firmware for some ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-34440
+CVE-2023-34440 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-43758
+CVE-2023-43758 (Improper input validation in UEFI firmware for some Intel(R) processor ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39355
+CVE-2024-39355 (Improper handling of physical or environmental conditions in some Inte ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-37020
+CVE-2024-37020 (Sequence of processor instructions leads to unexpected behavior in the ...)
- intel-microcode <unfixed> (bug #1095805)
[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
@@ -396,9 +616,9 @@ CVE-2024-33469 (An issue in Team Amaze Amaze File Manager v.3.8.5 and fixed in v
NOT-FOR-US: Team Amaze Amaze File Manager
CVE-2024-32037 (GeoNetwork is a catalog application to manage spatially referenced res ...)
NOT-FOR-US: GeoNetwork
-CVE-2024-29172 (Dell BSAFE SSL-J contains a deadlock vulnerability. A remote attacker ...)
+CVE-2024-29172 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 through 7.2, ...)
NOT-FOR-US: Dell
-CVE-2024-29171 (Dell BSAFE SSL-J contains an Improper certificate verification vulnera ...)
+CVE-2024-29171 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 through 7.2, ...)
NOT-FOR-US: Dell
CVE-2024-21971 (Improper input validation in AMD Crash Defender could allow an attacke ...)
NOT-FOR-US: AMD
@@ -3953,7 +4173,7 @@ CVE-2025-24166
CVE-2025-24163 (The issue was addressed with improved checks. This issue is fixed in i ...)
NOT-FOR-US: Apple
CVE-2025-24162 (This issue was addressed through improved state management. This issue ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -3966,7 +4186,7 @@ CVE-2025-24160 (The issue was addressed with improved checks. This issue is fixe
CVE-2025-24159 (A validation issue was addressed with improved logic. This issue is fi ...)
NOT-FOR-US: Apple
CVE-2025-24158 (The issue was addressed with improved memory handling. This issue is f ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -3983,7 +4203,7 @@ CVE-2025-24152 (The issue was addressed with improved memory handling. This issu
CVE-2025-24151 (The issue was addressed with improved memory handling. This issue is f ...)
NOT-FOR-US: Apple
CVE-2025-24150 (A privacy issue was addressed with improved handling of files. This is ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -3996,7 +4216,7 @@ CVE-2025-24146 (This issue was addressed with improved redaction of sensitive in
CVE-2025-24145 (A privacy issue was addressed with improved private data redaction for ...)
NOT-FOR-US: Apple
CVE-2025-24143 (The issue was addressed with improved access restrictions to the file ...)
- {DSA-5865-1}
+ {DSA-5865-1 DLA-4051-1}
- webkit2gtk 2.46.6-1
- wpewebkit 2.46.6-1
[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -228095,8 +228315,7 @@ CVE-2022-31633
RESERVED
CVE-2022-31632
RESERVED
-CVE-2022-31631
- RESERVED
+CVE-2022-31631 (In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before ...)
{DSA-5363-1 DLA-3345-1}
- php8.2 8.2.1-1
- php8.1 <removed>
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250213/031a4504/attachment.htm>
More information about the debian-security-tracker-commits
mailing list