Roberto C. Sánchez pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
31c42d09 by Roberto C. Sánchez at 2022-01-04T21:40:04-05:00
LTS: mark CVE-2020-22674/gpac as <not-affected> for buster

- - - - -
c166e99d by Roberto C. Sánchez at 2022-01-04T21:47:37-05:00
LTS: mark CVE-2019-20165/gpac as <not-affected> for stretch and buster

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -94268,7 +94268,7 @@ CVE-2020-22675 (An issue was discovered in gpac 0.8.0. 
The GetGhostNum function
        NOTE: 
https://github.com/gpac/gpac/commit/5aa8c4bbd970a3a77517b00528a596063efca1a9
 CVE-2020-22674 (An issue was discovered in gpac 0.8.0. An invalid memory 
dereference e ...)
        - gpac 1.0.1+dfsg1-2
-       [buster] - gpac <ignored> (Minor issue)
+       [buster] - gpac <not-affected> (Vulnerable code introduced later, in 
version 0.7.0)
        [stretch] - gpac <not-affected> (Vulnerable code introduced later, in 
version 0.7.0)
        NOTE: https://github.com/gpac/gpac/issues/1346
        NOTE: 
https://github.com/gpac/gpac/commit/6040a5981a9f51410bd18af8820afbd2748c2d76
@@ -139047,10 +139047,11 @@ CVE-2019-20166 (An issue was discovered in GPAC 
version 0.8.0 and 0.9.0-developm
 CVE-2019-20165 (An issue was discovered in GPAC version 0.8.0 and 
0.9.0-development-20 ...)
        {DLA-2072-1}
        - gpac 1.0.1+dfsg1-2 (bug #972053)
-       [buster] - gpac <no-dsa> (Minor issue)
-       [stretch] - gpac <no-dsa> (Minor issue)
+       [buster] - gpac <not-affected> (Vulnerable code introduced later, in 
version 0.8.0)
+       [stretch] - gpac <not-affected> (Vulnerable code introduced later, in 
version 0.8.0)
        NOTE: https://github.com/gpac/gpac/issues/1338
        NOTE: 
https://github.com/gpac/gpac/commit/5250afecbc770c8f26829e9566d5b226a3c5fa80 
(chunk #1)
+       NOTE: Introduced by 
https://github.com/gpac/gpac/commit/86d072b6a13baa1a4a90168098a0f8354c24d8cf
 CVE-2019-20164 (An issue was discovered in GPAC version 0.8.0 and 
0.9.0-development-20 ...)
        - gpac <not-affected> (Vulnerable code introduced in 0.7.0)
        NOTE: https://github.com/gpac/gpac/issues/1332



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9160b6122b2c4bf2798e2c327d837d19f21a87e4...c166e99d404462ca25d253157cc25a3a6e62bbd4

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9160b6122b2c4bf2798e2c327d837d19f21a87e4...c166e99d404462ca25d253157cc25a3a6e62bbd4
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
debian-security-tracker-commits@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to