Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits: 802e5a38 by security tracker role at 2025-01-21T20:12:46+00:00 automatic update - - - - - 1 changed file: - data/CVE/list Changes: ===================================== data/CVE/list ===================================== @@ -1,122 +1,320 @@ +CVE-2025-24461 (In JetBrains TeamCity before 2024.12.1 decryption of connection secret ...) + TODO: check +CVE-2025-24460 (In JetBrains TeamCity before 2024.12.1 improper access control allowed ...) + TODO: check +CVE-2025-24459 (In JetBrains TeamCity before 2024.12.1 reflected XSS was possible on t ...) + TODO: check +CVE-2025-24458 (In JetBrains YouTrack before 2024.3.55417 account takeover was possibl ...) + TODO: check +CVE-2025-24457 (In JetBrains YouTrack before 2024.3.55417 permanent tokens could be ex ...) + TODO: check +CVE-2025-24456 (In JetBrains Hub before 2024.3.55417 privilege escalation was possible ...) + TODO: check +CVE-2025-24024 (Mjolnir is a moderation tool for Matrix. Mjolnir v1.9.0 responds to ma ...) + TODO: check +CVE-2025-24020 (WeGIA is a Web manager for charitable institutions. An Open Redirect v ...) + TODO: check +CVE-2025-24019 (YesWiki is a wiki system written in PHP. In versions up to and includi ...) + TODO: check +CVE-2025-24018 (YesWiki is a wiki system written in PHP. In versions up to and includi ...) + TODO: check +CVE-2025-24017 (YesWiki is a wiki system written in PHP. Versions up to and including ...) + TODO: check +CVE-2025-24012 (Umbraco is a free and open source .NET content management system. Star ...) + TODO: check +CVE-2025-24011 (Umbraco is a free and open source .NET content management system. Star ...) + TODO: check +CVE-2025-24001 (Cross-Site Request Forgery (CSRF) vulnerability in PPO Vi\u1ec7t Nam ( ...) + TODO: check +CVE-2025-23998 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23997 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23996 (Cross-Site Request Forgery (CSRF) vulnerability in anyroad.com AnyRoad ...) + TODO: check +CVE-2025-23994 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23580 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23551 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23489 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23477 (Missing Authorization vulnerability in Realty Workstation Realty Works ...) + TODO: check +CVE-2025-23461 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23454 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-23369 (An improper verification of cryptographic signature vulnerability was ...) + TODO: check +CVE-2025-23184 (A potential denial of service vulnerability is present in versions of ...) + TODO: check +CVE-2025-23086 (On most desktop platforms, Brave Browser versions 1.70.x-1.73.x includ ...) + TODO: check +CVE-2025-22825 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22763 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22735 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22733 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22732 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22727 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22723 (Unrestricted Upload of File with Dangerous Type vulnerability in UkrSo ...) + TODO: check +CVE-2025-22722 (Missing Authorization vulnerability in Widget Options Team Widget Opti ...) + TODO: check +CVE-2025-22721 (Missing Authorization vulnerability in Farhan Noor ApplyOnline \u2013 ...) + TODO: check +CVE-2025-22719 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22718 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22717 (Missing Authorization vulnerability in Joe Dolson My Tickets allows Ac ...) + TODO: check +CVE-2025-22716 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2025-22711 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22710 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2025-22709 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22706 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22661 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22553 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2025-22322 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22318 (Missing Authorization vulnerability in Eniture Technology Standard Box ...) + TODO: check +CVE-2025-22311 (Improper Control of Filename for Include/Require Statement in PHP Prog ...) + TODO: check +CVE-2025-22276 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22267 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22262 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2025-22150 (Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to v ...) + TODO: check +CVE-2025-0623 + REJECTED +CVE-2025-0615 (Input validation vulnerability in Qualifio's Wheel of Fortune. This vu ...) + TODO: check +CVE-2025-0614 (Input validation vulnerability in Qualifio's Wheel of Fortune. This vu ...) + TODO: check +CVE-2025-0450 (The Betheme plugin for WordPress is vulnerable to Stored Cross-Site Sc ...) + TODO: check +CVE-2025-0377 (HashiCorp\u2019s go-slug library is vulnerable to a zip-slip style att ...) + TODO: check +CVE-2025-0371 (The JetElements plugin for WordPress is vulnerable to Stored Cross-Sit ...) + TODO: check +CVE-2024-6466 (NEC Corporation's WebSAM DeploymentManager v6.0 to v6.80 allows an att ...) + TODO: check +CVE-2024-57036 (TOTOLINK A810R V4.1.2cu.5032_B20200407 was found to contain a command ...) + TODO: check +CVE-2024-56998 (PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site ...) + TODO: check +CVE-2024-56997 (PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site ...) + TODO: check +CVE-2024-56990 (PHPGurukul Hospital Management System 4.0 is vulnerable to Cross Site ...) + TODO: check +CVE-2024-56277 (Improper Encoding or Escaping of Output vulnerability in Poll Maker Te ...) + TODO: check +CVE-2024-55504 (An issue in RAR Extractor - Unarchiver Free and Pro v.6.4.0 allows loc ...) + TODO: check +CVE-2024-54795 (SpagoBI v3.5.1 contains multiple Stored Cross-Site Scripting (XSS) vul ...) + TODO: check +CVE-2024-54794 (The script input feature of SpagoBI 3.5.1 allows arbitrary code execut ...) + TODO: check +CVE-2024-54792 (A Cross-Site Request Forgery (CSRF) vulnerability has been found in Sp ...) + TODO: check +CVE-2024-53829 (CodeChecker is an analyzer tooling, defect database and viewer extensi ...) + TODO: check +CVE-2024-52973 (An allocation of resources without limits or throttling in Kibana can ...) + TODO: check +CVE-2024-51919 (Unrestricted Upload of File with Dangerous Type vulnerability in NotFo ...) + TODO: check +CVE-2024-51888 (Incorrect Privilege Assignment vulnerability in NotFound Homey Login R ...) + TODO: check +CVE-2024-51818 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2024-51417 (An issue in System.Linq.Dynamic.Core Latest version v.1.4.6 allows rem ...) + TODO: check +CVE-2024-49700 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2024-49699 (Deserialization of Untrusted Data vulnerability in NotFound ARPrice al ...) + TODO: check +CVE-2024-49688 (Deserialization of Untrusted Data vulnerability in NotFound ARPrice al ...) + TODO: check +CVE-2024-49666 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2024-49655 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2024-49333 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2024-49303 (Improper Neutralization of Special Elements used in an SQL Command ('S ...) + TODO: check +CVE-2024-49300 (Improper Neutralization of Input During Web Page Generation ('Cross-si ...) + TODO: check +CVE-2024-45687 (Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Reque ...) + TODO: check +CVE-2024-45091 (IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.24, 7.1 through 7.1.2.10, ...) + TODO: check +CVE-2024-43709 (An allocation of resources without limits or throttling in Elasticsear ...) + TODO: check +CVE-2024-42936 (The mqlink.elf is service component in Ruijie RG-EW300N with firmware ...) + TODO: check +CVE-2024-37284 (Improper handling of alternate encoding occurs when Elastic Defend on ...) + TODO: check +CVE-2024-32555 (Incorrect Privilege Assignment vulnerability in NotFound Easy Real Est ...) + TODO: check +CVE-2024-13536 (The 1003 Mortgage Application plugin for WordPress is vulnerable to Fu ...) + TODO: check +CVE-2024-13454 (Weak encryption algorithm in Easy-RSA version 3.0.5 through 3.1.7 allo ...) + TODO: check +CVE-2024-13444 (The wp-greet plugin for WordPress is vulnerable to Cross-Site Request ...) + TODO: check +CVE-2024-13404 (The Link Library plugin for WordPress is vulnerable to Reflected Cross ...) + TODO: check +CVE-2024-13230 (The Social Share, Social Login and Social Comments Plugin \u2013 Super ...) + TODO: check +CVE-2024-12104 (The Visual Website Collaboration, Feedback & Project Management \u2013 ...) + TODO: check +CVE-2024-12005 (The WP-BibTeX plugin for WordPress is vulnerable to Cross-Site Request ...) + TODO: check +CVE-2024-11226 (The FireCask Like & Share Button plugin for WordPress is vulnerable to ...) + TODO: check +CVE-2024-10936 (The String locator plugin for WordPress is vulnerable to PHP Object In ...) + TODO: check +CVE-2023-45908 (Homarr before v0.14.0 was discovered to contain a stored cross-site sc ...) + TODO: check CVE-2024-45479 NOT-FOR-US: Apache Ranger CVE-2024-45478 NOT-FOR-US: Apache Ranger -CVE-2025-21664 [dm thin: make get_first_thin use rcu-safe list first function] +CVE-2025-21664 (In the Linux kernel, the following vulnerability has been resolved: d ...) - linux 6.12.10-1 NOTE: https://git.kernel.org/linus/80f130bfad1dab93b95683fc39b87235682b8f72 (6.13-rc7) -CVE-2025-21663 [net: stmmac: dwmac-tegra: Read iommu stream id from device tree] +CVE-2025-21663 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/426046e2d62dd19533808661e912b8e8a9eaec16 (6.13-rc7) -CVE-2025-21662 [net/mlx5: Fix variable not being completed when function returns] +CVE-2025-21662 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.10-1 [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/0e2909c6bec9048f49d0c8e16887c63b50b14647 (6.13-rc7) -CVE-2025-21661 [gpio: virtuser: fix missing lookup table cleanups] +CVE-2025-21661 (In the Linux kernel, the following vulnerability has been resolved: g ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/a619cba8c69c434258ff4101d463322cd63e1bdc (6.13-rc7) -CVE-2025-21660 [ksmbd: fix unexpectedly changed path in ksmbd_vfs_kern_path_locked] +CVE-2025-21660 (In the Linux kernel, the following vulnerability has been resolved: k ...) - linux 6.12.10-1 [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/2ac538e40278a2c0c051cca81bcaafc547d61372 (6.13-rc7) -CVE-2025-21659 [netdev: prevent accessing NAPI instances from another namespace] +CVE-2025-21659 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/d1cacd74776895f6435941f86a1130e58f6dd226 (6.13-rc7) -CVE-2025-21658 [btrfs: avoid NULL pointer dereference if no valid extent tree] +CVE-2025-21658 (In the Linux kernel, the following vulnerability has been resolved: b ...) - linux 6.12.10-1 [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/6aecd91a5c5b68939cf4169e32bc49f3cd2dd329 (6.13-rc7) -CVE-2025-21657 [sched_ext: Replace rq_lock() to raw_spin_rq_lock() in scx_ops_bypass()] +CVE-2025-21657 (In the Linux kernel, the following vulnerability has been resolved: s ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/6268d5bc10354fc2ab8d44a0cd3b042d49a0417e (6.13-rc7) -CVE-2025-21656 [hwmon: (drivetemp) Fix driver producing garbage data when SCSI errors occur] +CVE-2025-21656 (In the Linux kernel, the following vulnerability has been resolved: h ...) - linux 6.12.10-1 NOTE: https://git.kernel.org/linus/82163d63ae7a4c36142cd252388737205bb7e4b9 (6.13-rc7) -CVE-2024-57946 [virtio-blk: don't keep queue frozen during system suspend] +CVE-2024-57946 (In the Linux kernel, the following vulnerability has been resolved: v ...) - linux 6.12.8-1 [bookworm] - linux 6.1.123-1 NOTE: https://git.kernel.org/linus/7678abee0867e6b7fb89aa40f6e9f575f755fb37 (6.13-rc2) -CVE-2024-57945 [riscv: mm: Fix the out of bound issue of vmemmap address] +CVE-2024-57945 (In the Linux kernel, the following vulnerability has been resolved: r ...) - linux 6.12.10-1 NOTE: https://git.kernel.org/linus/f754f27e98f88428aaf6be6e00f5cbce97f62d4b (6.13-rc7) -CVE-2024-57944 [iio: adc: ti-ads1298: Add NULL check in ads1298_init] +CVE-2024-57944 (In the Linux kernel, the following vulnerability has been resolved: i ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/bcb394bb28e55312cace75362b8e489eb0e02a30 (6.13-rc7) -CVE-2024-57943 [exfat: fix the new buffer was not zeroed before writing] +CVE-2024-57943 (In the Linux kernel, the following vulnerability has been resolved: e ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/98e2fb26d1a9eafe79f46d15d54e68e014d81d8c (6.13-rc7) -CVE-2024-57942 [netfs: Fix ceph copy to cache on write-begin] +CVE-2024-57942 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/38cf8e945721ffe708fa675507465da7f4f2a9f7 (6.13-rc7) -CVE-2024-57941 [netfs: Fix the (non-)cancellation of copy when cache is temporarily disabled] +CVE-2024-57941 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.10-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/d0327c824338cdccad058723a31d038ecd553409 (6.13-rc7) -CVE-2024-57940 [exfat: fix the infinite loop in exfat_readdir()] +CVE-2024-57940 (In the Linux kernel, the following vulnerability has been resolved: e ...) - linux 6.12.10-1 NOTE: https://git.kernel.org/linus/fee873761bd978d077d8c55334b4966ac4cb7b59 (6.13-rc7) -CVE-2024-57939 [riscv: Fix sleeping in invalid context in die()] +CVE-2024-57939 (In the Linux kernel, the following vulnerability has been resolved: r ...) - linux 6.12.10-1 NOTE: https://git.kernel.org/linus/6a97f4118ac07cfdc316433f385dbdc12af5025e (6.13-rc7) -CVE-2024-57938 [net/sctp: Prevent autoclose integer overflow in sctp_association_init()] +CVE-2024-57938 (In the Linux kernel, the following vulnerability has been resolved: n ...) - linux 6.12.9-1 [bookworm] - linux 6.1.124-1 NOTE: https://git.kernel.org/linus/4e86729d1ff329815a6e8a920cb554a1d4cb5b8d (6.13-rc6) -CVE-2024-57937 [mm: reinstate ability to map write-sealed memfd mappings read-only] +CVE-2024-57937 (In the Linux kernel, the following vulnerability has been resolved: m ...) - linux 6.12.9-1 NOTE: https://git.kernel.org/linus/8ec396d05d1b737c87311fb7311f753b02c2a6b1 (6.13-rc6) -CVE-2024-57936 [RDMA/bnxt_re: Fix max SGEs for the Work Request] +CVE-2024-57936 (In the Linux kernel, the following vulnerability has been resolved: R ...) - linux 6.12.9-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/79d330fbdffd8cee06d8bdf38d82cb62d8363a27 (6.13-rc6) -CVE-2024-57935 [RDMA/hns: Fix accessing invalid dip_ctx during destroying QP] +CVE-2024-57935 (In the Linux kernel, the following vulnerability has been resolved: R ...) - linux 6.12.9-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/0572eccf239ce4bd89bd531767ec5ab20e249290 (6.13-rc6) -CVE-2024-57934 [fgraph: Add READ_ONCE() when accessing fgraph_array[]] +CVE-2024-57934 (In the Linux kernel, the following vulnerability has been resolved: f ...) - linux 6.12.9-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/d65474033740ded0a4fe9a097fce72328655b41d (6.13-rc6) -CVE-2024-57933 [gve: guard XSK operations on the existence of queues] +CVE-2024-57933 (In the Linux kernel, the following vulnerability has been resolved: g ...) - linux 6.12.9-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/40338d7987d810fcaa95c500b1068a52b08eec9b (6.13-rc6) -CVE-2024-57932 [gve: guard XDP xmit NDO on existence of xdp queues] +CVE-2024-57932 (In the Linux kernel, the following vulnerability has been resolved: g ...) - linux 6.12.9-1 [bookworm] - linux <not-affected> (Vulnerable code not present) [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/ff7c2dea9dd1a436fc79d6273adffdcc4a7ffea3 (6.13-rc6) -CVE-2024-57931 [selinux: ignore unknown extended permissions] +CVE-2024-57931 (In the Linux kernel, the following vulnerability has been resolved: s ...) - linux 6.12.9-1 [bookworm] - linux 6.1.124-1 NOTE: https://git.kernel.org/linus/900f83cf376bdaf798b6f5dcb2eae0c822e908b6 (6.13-rc4) -CVE-2024-57930 [tracing: Have process_string() also allow arrays] +CVE-2024-57930 (In the Linux kernel, the following vulnerability has been resolved: t ...) - linux 6.12.9-1 [bookworm] - linux 6.1.124-1 [bullseye] - linux <not-affected> (Vulnerable code not present) NOTE: https://git.kernel.org/linus/afc6717628f959941d7b33728570568b4af1c4b8 (6.13-rc6) CVE-2022-4975 NOT-FOR-US: Red Hat Advanced Cluster Security -CVE-2025-24014 [segmentation fault in win_line()] +CVE-2025-24014 (Vim is an open source, command line text editor. A segmentation fault ...) - vim <unfixed> (unimportant) NOTE: Crash in CLI tool, no security impact NOTE: https://github.com/vim/vim/security/advisories/GHSA-j3g9-wg22-v955 @@ -1241,7 +1439,7 @@ CVE-2024-52602 (Matrix Media Repo (MMR) is a highly configurable multi-homeserve NOT-FOR-US: Matrix Media Repo (MMR) CVE-2024-52594 (Gomatrixserverlib is a Go library for matrix federation. Gomatrixserve ...) NOT-FOR-US: Gomatrixserverlib -CVE-2024-50633 (A Broken Object Level Authorization (BOLA) vulnerability in Indico v3. ...) +CVE-2024-50633 (A Broken Object Level Authorization (BOLA) vulnerability in Indico thr ...) NOT-FOR-US: Indico CVE-2024-50563 (A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer ve ...) NOT-FOR-US: FortiGuard @@ -10088,6 +10286,7 @@ CVE-2024-10972 (Velocidex WinPmem versions 4.1 and below suffer from an Improper CVE-2024-10095 (In Progress Telerik UI for WPF versions prior to 2024 Q4 (2024.4.1213) ...) NOT-FOR-US: Telerik CVE-2024-55919 [Improper input validation on generic SSO login] + {DLA-4027-1} - sympa 6.2.74~dfsg-1 (bug #1090188) NOTE: https://www.sympa.community/security/2024-001.html NOTE: Patch: https://github.com/sympa-community/sympa/releases/download/6.2.74/sympa-6.2.72-sa-2024-001-r1.patch View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/802e5a3821a5a46219b59ac329ff4031ebb52178 -- View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/802e5a3821a5a46219b59ac329ff4031ebb52178 You're receiving this email because of your account on salsa.debian.org.
_______________________________________________ debian-security-tracker-commits mailing list debian-security-tracker-commits@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits