[Git][security-tracker-team/security-tracker][master] automatic update

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Feb 13 08:12:16 GMT 2025



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
964f262f by security tracker role at 2025-02-13T08:12:10+00:00
automatic update

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -1,3 +1,223 @@
+CVE-2025-25286 (Crayfish is a collection of Islandora 8 microservices, one of which, H ...)
+	TODO: check
+CVE-2025-20097 (Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP  ...)
+	TODO: check
+CVE-2025-1229 (A vulnerability classified as critical was found in olajowon Loggrove  ...)
+	TODO: check
+CVE-2025-1228 (A vulnerability classified as problematic has been found in olajowon L ...)
+	TODO: check
+CVE-2025-1227 (A vulnerability was found in ywoa up to 2024.07.03. It has been rated  ...)
+	TODO: check
+CVE-2025-1226 (A vulnerability was found in ywoa up to 2024.07.03. It has been declar ...)
+	TODO: check
+CVE-2025-1198 (An issue discovered in GitLab CE/EE affecting all versions from 16.11  ...)
+	TODO: check
+CVE-2025-1070 (CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability ...)
+	TODO: check
+CVE-2025-1060 (CWE-319: Cleartext Transmission of Sensitive Information vulnerability ...)
+	TODO: check
+CVE-2025-1059 (CWE-770: Allocation of Resources Without Limits or Throttling vulnerab ...)
+	TODO: check
+CVE-2025-1058 (CWE-494: Download of Code Without Integrity Check vulnerability exists ...)
+	TODO: check
+CVE-2025-0896 (Orthanc server prior to version 1.5.8 does not enable basic authentica ...)
+	TODO: check
+CVE-2025-0837 (The Puzzles theme for WordPress is vulnerable to Stored Cross-Site Scr ...)
+	TODO: check
+CVE-2025-0816 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+	TODO: check
+CVE-2025-0815 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+	TODO: check
+CVE-2025-0814 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+	TODO: check
+CVE-2025-0692 (The Simple Video Management System WordPress plugin through 1.0.4 does ...)
+	TODO: check
+CVE-2025-0661 (The DethemeKit For Elementor plugin for WordPress is vulnerable to Inf ...)
+	TODO: check
+CVE-2025-0327 (CWE-269: Improper Privilege Management vulnerability exists for two se ...)
+	TODO: check
+CVE-2025-0113 (A problem with the network isolation mechanism of the Palo Alto Networ ...)
+	TODO: check
+CVE-2025-0111 (An authenticated file read vulnerability in the Palo Alto Networks PAN ...)
+	TODO: check
+CVE-2025-0110 (A command injection vulnerability in the Palo Alto Networks PAN-OS Ope ...)
+	TODO: check
+CVE-2025-0109 (An unauthenticated file deletion vulnerability in the Palo Alto Networ ...)
+	TODO: check
+CVE-2025-0108 (An authentication bypass in the Palo Alto Networks PAN-OS software ena ...)
+	TODO: check
+CVE-2024-8266 (An issue was discovered in GitLab CE/EE affecting all versions startin ...)
+	TODO: check
+CVE-2024-7102 (An issue was discovered in GitLab CE/EE affecting all versions startin ...)
+	TODO: check
+CVE-2024-57605 (Cross Site Scripting vulnerability in Daylight Studio Fuel CMS v.1.5.2 ...)
+	TODO: check
+CVE-2024-57604 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to e ...)
+	TODO: check
+CVE-2024-57603 (An issue in MaysWind ezBookkeeping 0.7.0 allows a remote attacker to e ...)
+	TODO: check
+CVE-2024-57602 (An issue in Alex Tselegidis EasyAppointments v.1.5.0 allows a remote a ...)
+	TODO: check
+CVE-2024-57601 (Cross Site Scripting vulnerability in Alex Tselegidis EasyAppointments ...)
+	TODO: check
+CVE-2024-56940 (An issue in the profile image upload function of LearnDash v6.7.1 allo ...)
+	TODO: check
+CVE-2024-56939 (LearnDash v6.7.1 was discovered to contain a stored cross-site scripti ...)
+	TODO: check
+CVE-2024-56938 (LearnDash v6.7.1 was discovered to contain a stored cross-site scripti ...)
+	TODO: check
+CVE-2024-51440 (An issue in Nothing Tech Nothing OS v.2.6 allows a local attacker to e ...)
+	TODO: check
+CVE-2024-51376 (Directory Traversal vulnerability in yeqifu carRental v.1.0 allows a r ...)
+	TODO: check
+CVE-2024-51123 (An issue in Zertificon Z1 SecureMail Z1 SecureMail Gateway 4.44.2-7240 ...)
+	TODO: check
+CVE-2024-51122 (Cross Site Scripting vulnerability in Zertificon Z1 SecureMail Z1 Cert ...)
+	TODO: check
+CVE-2024-47266 (Improper limitation of a pathname to a restricted directory ('Path Tra ...)
+	TODO: check
+CVE-2024-47265 (Improper limitation of a pathname to a restricted directory ('Path Tra ...)
+	TODO: check
+CVE-2024-47264 (Improper limitation of a pathname to a restricted directory ('Path Tra ...)
+	TODO: check
+CVE-2024-47006 (Uncontrolled search path for the Intel(R) RealSense D400 Series Univer ...)
+	TODO: check
+CVE-2024-46923 (An issue was discovered in Samsung Mobile Processor Exynos 2200, 1480, ...)
+	TODO: check
+CVE-2024-46922 (An issue was discovered in Samsung Mobile Processor Exynos 1480 and 24 ...)
+	TODO: check
+CVE-2024-42492 (Uncontrolled search path element in some BIOS and System Firmware Upda ...)
+	TODO: check
+CVE-2024-42419 (Incorrect default permissions for some Intel(R) GPA and Intel(R) GPA F ...)
+	TODO: check
+CVE-2024-42410 (Improper input validation in some Intel(R) Graphics Drivers may allow  ...)
+	TODO: check
+CVE-2024-42405 (Uncontrolled search path for some Intel(R) Quartus(R) Prime Software b ...)
+	TODO: check
+CVE-2024-41934 (Improper access control in some Intel(R) GPA software before version 2 ...)
+	TODO: check
+CVE-2024-41917 (Time-of-check time-of-use race condition for some Intel(R) Battery Lif ...)
+	TODO: check
+CVE-2024-41168 (Use after free in some Intel(R) PROSet/Wireless WiFi and Killer\xe2\u2 ...)
+	TODO: check
+CVE-2024-41166 (Stack-based buffer overflow in some Intel(R) PROSet/Wireless WiFi and  ...)
+	TODO: check
+CVE-2024-40887 (Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\xe2\u2 ...)
+	TODO: check
+CVE-2024-39813 (Uncontrolled search path for some EPCT software before version 1.42.8. ...)
+	TODO: check
+CVE-2024-39805 (Insufficient verification of data authenticity in some Intel(R) DSA so ...)
+	TODO: check
+CVE-2024-39797 (Improper access control in some drivers for Intel(R) Ethernet Connecti ...)
+	TODO: check
+CVE-2024-39779 (Stack-based buffer overflow in some drivers for Intel(R) Ethernet Conn ...)
+	TODO: check
+CVE-2024-39606 (Improper input validation in some Intel(R) PROSet/Wireless WiFi and Ki ...)
+	TODO: check
+CVE-2024-39372 (Uncontrolled search path for the Intel(R) XTU software for Windows bef ...)
+	TODO: check
+CVE-2024-39365 (Uncontrolled search path for the FPGA Support Package for the Intel(R) ...)
+	TODO: check
+CVE-2024-39356 (NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi and Kil ...)
+	TODO: check
+CVE-2024-39286 (Incorrect execution-assigned permissions in the Linux kernel mode driv ...)
+	TODO: check
+CVE-2024-39284 (Uncontrolled search path for some Intel(R) Advisor software before ver ...)
+	TODO: check
+CVE-2024-39271 (Improper restriction of communication channel to intended endpoints in ...)
+	TODO: check
+CVE-2024-38310 (Improper access control in some Intel(R) Graphics Driver software inst ...)
+	TODO: check
+CVE-2024-38307 (Improper input validation in the firmware for some Intel(R) AMT and In ...)
+	TODO: check
+CVE-2024-37355 (Improper access control in some Intel(R) Graphics software may allow a ...)
+	TODO: check
+CVE-2024-36291 (Uncontrolled search path for some Intel(R) Chipset Software Installati ...)
+	TODO: check
+CVE-2024-36285 (Race condition in some Intel(R) PROSet/Wireless WiFi and Killer\xe2\u2 ...)
+	TODO: check
+CVE-2024-36283 (Uncontrolled search path for the Intel(R) Thread Director Visualizer s ...)
+	TODO: check
+CVE-2024-36280 (Uncontrolled search path for some Intel(R) High Level Synthesis Compil ...)
+	TODO: check
+CVE-2024-36274 (Out-of-bounds write in the Intel(R) 800 Series Ethernet Driver for Int ...)
+	TODO: check
+CVE-2024-36262 (Race condition in some Intel(R) System Security Report and System Reso ...)
+	TODO: check
+CVE-2024-34521 (A directory traversal vulnerability exists in the Mavenir SCE Applicat ...)
+	TODO: check
+CVE-2024-34520 (An authorization bypass vulnerability exists in the Mavenir SCE Applic ...)
+	TODO: check
+CVE-2024-32942 (Incorrect default permissions for some Intel(R) DSA installer for Wind ...)
+	TODO: check
+CVE-2024-32941 (NULL pointer dereference for some Intel(R) MLC software before version ...)
+	TODO: check
+CVE-2024-32938 (Uncontrolled search path for some Intel(R) MPI Library for Windows sof ...)
+	TODO: check
+CVE-2024-31858 (Out-of-bounds write for some Intel(R) QuickAssist Technology software  ...)
+	TODO: check
+CVE-2024-31155 (Improper buffer restrictions in the UEFI firmware for some Intel(R) Pr ...)
+	TODO: check
+CVE-2024-31153 (Improper input validation for some Intel(R) QuickAssist Technology sof ...)
+	TODO: check
+CVE-2024-30211 (Improper access control in some Intel(R) ME driver pack installer engi ...)
+	TODO: check
+CVE-2024-29223 (Uncontrolled search path for some Intel(R) QuickAssist Technology soft ...)
+	TODO: check
+CVE-2024-26021 (Improper initialization in the firmware for some Intel(R) AMT and Inte ...)
+	TODO: check
+CVE-2024-25571 (Improper input validation in some Intel(R) SPS firmware before SPS_E5_ ...)
+	TODO: check
+CVE-2024-24852 (Uncontrolled search path in some Intel(R) Ethernet Adapter Complete Dr ...)
+	TODO: check
+CVE-2024-21859 (Improper buffer restrictions in the UEFI firmware for some Intel(R) Pr ...)
+	TODO: check
+CVE-2024-21830 (Uncontrolled search path in some Intel(R) VPL software before version  ...)
+	TODO: check
+CVE-2024-13770 (The Puzzles | WP Magazine / Review with Store WordPress Theme + RTL th ...)
+	TODO: check
+CVE-2024-13644 (The DethemeKit For Elementor plugin for WordPress is vulnerable to Sto ...)
+	TODO: check
+CVE-2024-13346 (The Avada | Website Builder For WordPress & WooCommerce theme for Word ...)
+	TODO: check
+CVE-2024-13345 (The Avada Builder plugin for WordPress is vulnerable to arbitrary shor ...)
+	TODO: check
+CVE-2024-13229 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin  ...)
+	TODO: check
+CVE-2024-13227 (The Rank Math SEO \u2013 AI SEO Tools to Dominate SEO Rankings plugin  ...)
+	TODO: check
+CVE-2024-13125 (The Everest Forms  WordPress plugin before 3.0.8.1 does not sanitise a ...)
+	TODO: check
+CVE-2024-13121 (The Paid Membership Plugin, Ecommerce, User Registration Form, Login F ...)
+	TODO: check
+CVE-2024-13120 (The Paid Membership Plugin, Ecommerce, User Registration Form, Login F ...)
+	TODO: check
+CVE-2024-13119 (The Paid Membership Plugin, Ecommerce, User Registration Form, Login F ...)
+	TODO: check
+CVE-2024-12673 (An improper privilege vulnerability was reported in a BIOS customizati ...)
+	TODO: check
+CVE-2024-12586 (The Chalet-Montagne.com Tools WordPress plugin through 2.7.8 does not  ...)
+	TODO: check
+CVE-2024-10763 (The Campress theme for WordPress is vulnerable to Local File Inclusion ...)
+	TODO: check
+CVE-2024-10083 (CWE-20: Improper Input Validation vulnerability exists that could caus ...)
+	TODO: check
+CVE-2023-49618 (Improper buffer restrictions in some Intel(R) System Security Report a ...)
+	TODO: check
+CVE-2023-49615 (Improper input validation in some Intel(R) System Security Report and  ...)
+	TODO: check
+CVE-2023-49603 (Race condition in some Intel(R) System Security Report and System Reso ...)
+	TODO: check
+CVE-2023-48366 (Race condition in some Intel(R) System Security Report and System Reso ...)
+	TODO: check
+CVE-2023-48267 (Improper buffer restrictions in some Intel(R) System Security Report a ...)
+	TODO: check
+CVE-2023-32277 (Untrusted Pointer Dereference in I/O subsystem for some Intel(R) QAT s ...)
+	TODO: check
+CVE-2023-31276 (Heap-based buffer overflow in BMC Firmware for the Intel(R) Server Boa ...)
+	TODO: check
+CVE-2023-29164 (Improper access control in BMC Firmware for the Intel(R) Server Board  ...)
+	TODO: check
 CVE-2025-1247
 	NOT-FOR-US: Quarkus
 CVE-2025-26378 (A CWE-862 "Missing Authorization" in maxprofile/users/routes.lua in Q- ...)
@@ -294,62 +514,62 @@ CVE-2024-57951 (In the Linux kernel, the following vulnerability has been resolv
 	NOTE: https://git.kernel.org/linus/2f8dea1692eef2b7ba6a256246ed82c365fdc686 (6.13)
 CVE-2025-26467
 	- cassandra <itp> (bug #585905)
-CVE-2024-31068
+CVE-2024-31068 (Improper Finite State Machines (FSMs) in Hardware Logic for some Intel ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01166.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-36293
+CVE-2024-36293 (Improper access control in the EDECCSSA user leaf function for some In ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28047
+CVE-2024-28047 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-31157
+CVE-2024-31157 (Improper initialization in UEFI firmware OutOfBandXML module in some I ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39279
+CVE-2024-39279 (Insufficient granularity of access control in UEFI firmware in some In ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-28127
+CVE-2024-28127 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-29214
+CVE-2024-29214 (Improper input validation in UEFI firmware CseVariableStorageSmm for s ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-24582
+CVE-2024-24582 (Improper input validation in XmlCli feature for UEFI firmware for some ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-34440
+CVE-2023-34440 (Improper input validation in UEFI firmware for some Intel(R) Processor ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2023-43758
+CVE-2023-43758 (Improper input validation in UEFI firmware for some Intel(R) processor ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01139.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-39355
+CVE-2024-39355 (Improper handling of physical or environmental conditions in some Inte ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01228.html
 	NOTE: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/releases/tag/microcode-20250211
-CVE-2024-37020
+CVE-2024-37020 (Sequence of processor instructions leads to unexpected behavior in the ...)
 	- intel-microcode <unfixed> (bug #1095805)
 	[bookworm] - intel-microcode <postponed> (Minor issue; wait for unstable exposure, can be fixed via point release)
 	NOTE: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01194.html
@@ -396,9 +616,9 @@ CVE-2024-33469 (An issue in Team Amaze Amaze File Manager v.3.8.5 and fixed in v
 	NOT-FOR-US: Team Amaze Amaze File Manager
 CVE-2024-32037 (GeoNetwork is a catalog application to manage spatially referenced res ...)
 	NOT-FOR-US: GeoNetwork
-CVE-2024-29172 (Dell BSAFE SSL-J contains a deadlock vulnerability. A remote attacker  ...)
+CVE-2024-29172 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 through 7.2,  ...)
 	NOT-FOR-US: Dell
-CVE-2024-29171 (Dell BSAFE SSL-J contains an Improper certificate verification vulnera ...)
+CVE-2024-29171 (Dell BSAFE SSL-J, versions prior to 6.6 and versions 7.0 through 7.2,  ...)
 	NOT-FOR-US: Dell
 CVE-2024-21971 (Improper input validation in AMD Crash Defender could allow an attacke ...)
 	NOT-FOR-US: AMD
@@ -3953,7 +4173,7 @@ CVE-2025-24166
 CVE-2025-24163 (The issue was addressed with improved checks. This issue is fixed in i ...)
 	NOT-FOR-US: Apple
 CVE-2025-24162 (This issue was addressed through improved state management. This issue ...)
-	{DSA-5865-1}
+	{DSA-5865-1 DLA-4051-1}
 	- webkit2gtk 2.46.6-1
 	- wpewebkit 2.46.6-1
 	[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -3966,7 +4186,7 @@ CVE-2025-24160 (The issue was addressed with improved checks. This issue is fixe
 CVE-2025-24159 (A validation issue was addressed with improved logic. This issue is fi ...)
 	NOT-FOR-US: Apple
 CVE-2025-24158 (The issue was addressed with improved memory handling. This issue is f ...)
-	{DSA-5865-1}
+	{DSA-5865-1 DLA-4051-1}
 	- webkit2gtk 2.46.6-1
 	- wpewebkit 2.46.6-1
 	[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -3983,7 +4203,7 @@ CVE-2025-24152 (The issue was addressed with improved memory handling. This issu
 CVE-2025-24151 (The issue was addressed with improved memory handling. This issue is f ...)
 	NOT-FOR-US: Apple
 CVE-2025-24150 (A privacy issue was addressed with improved handling of files. This is ...)
-	{DSA-5865-1}
+	{DSA-5865-1 DLA-4051-1}
 	- webkit2gtk 2.46.6-1
 	- wpewebkit 2.46.6-1
 	[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -3996,7 +4216,7 @@ CVE-2025-24146 (This issue was addressed with improved redaction of sensitive in
 CVE-2025-24145 (A privacy issue was addressed with improved private data redaction for ...)
 	NOT-FOR-US: Apple
 CVE-2025-24143 (The issue was addressed with improved access restrictions to the file  ...)
-	{DSA-5865-1}
+	{DSA-5865-1 DLA-4051-1}
 	- webkit2gtk 2.46.6-1
 	- wpewebkit 2.46.6-1
 	[bookworm] - wpewebkit <ignored> (wpewebkit not covered by security support in Bookworm)
@@ -228095,8 +228315,7 @@ CVE-2022-31633
 	RESERVED
 CVE-2022-31632
 	RESERVED
-CVE-2022-31631
-	RESERVED
+CVE-2022-31631 (In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before ...)
 	{DSA-5363-1 DLA-3345-1}
 	- php8.2 8.2.1-1
 	- php8.1 <removed>



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/964f262f1412c820ba1ffeebc1241a4b9a8634dd
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20250213/031a4504/attachment.htm>


More information about the debian-security-tracker-commits mailing list