mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-05-19 19:50:33 +02:00
Compare commits
2 commits
4c67eea390
...
8c84dab2ad
Author | SHA1 | Date | |
---|---|---|---|
8c84dab2ad | |||
![]() |
856de3fd46 |
1 changed files with 9 additions and 0 deletions
|
@ -37,3 +37,12 @@ ignore:
|
|||
# [bookworm] - raptor2 <postponed> (Minor issue, revisit when fixed upstream)
|
||||
#
|
||||
- vulnerability: CVE-2024-57823
|
||||
# CVE-2025-0665
|
||||
# ==============
|
||||
#
|
||||
# Debian tracker: https://security-tracker.debian.org/tracker/CVE-2025-0665
|
||||
# Verdict: Dangerzone is not affected because the vulnerable code is not
|
||||
# present in Debian Bookworm. Also, libcurl is an HTTP client, and the
|
||||
# Dangerzone container does not make any network calls.
|
||||
- vulnerability: CVE-2025-0665
|
||||
|
||||
|
|
Loading…
Reference in a new issue