Bug#1016578: milkytracker: CVE-2022-34927 - stack overflow via the component LoaderXM::load

2022-08-03 Thread Neil Williams
Source: milkytracker Version: 1.03.00+dfsg-2 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team Hi, The following vulnerability was published for milkytracker. CVE-2022-34927[0]: | MilkyTracker v1.03.00 was discovered to contain a stack

Bug#993979: gpac: CVE-2020-19751 The gf_odf_del_ipmp_tool function in odf_code.c has a heap-based buffer over-read

2021-09-09 Thread Neil Williams
Source: gpac Version: 1.0.1+dfsg1-5 Severity: important Tags: security upstream X-Debbugs-Cc: codeh...@debian.org, Debian Security Team A security vulnerability exists in gpac at version 1.0.1+dfsg1-5. (Vulnerable code was introduced after the version currently in buster but remains present in

Bug#993372: Bug#993378: RM: gtkpod -- RoQA; Upstream not active, orphaned & uses a vulnerable embedded library

2021-09-01 Thread Neil Williams
On Wed, 1 Sep 2021 12:08:16 +0300 Adrian Bunk wrote: > On Wed, Sep 01, 2021 at 09:32:09AM +0100, Neil Williams wrote: > >... > > Hi Adrian. > > Hi Neil, > > > Sorry, No. The commit linked to CVE-2021-37232 does not even fix the > > problem des

Bug#993372: Bug#993378: RM: gtkpod -- RoQA; Upstream not active, orphaned & uses a vulnerable embedded library

2021-09-01 Thread Neil Williams
On Wed, 1 Sep 2021 11:05:09 +0300 Adrian Bunk wrote: > Control: tags 993378 moreinfo > > On Tue, Aug 31, 2021 at 03:49:45PM +0100, Neil Williams wrote: > > Package: ftp.debian.org > > Severity: normal > > > > gtkpod upstream has moved but has not had

Bug#993372: atomicparsley: CVE-2021-37231 - stack-buffer overflow in APar_readX in src/extract.cpp

2021-08-31 Thread Neil Williams
Package: atomicparsley Version: 0.9.6-2 Severity: important Tags: patch security https://github.com/wez/atomicparsley/issues/30 See also #993366 AtomicParsley, at the version in buster, bullseye, bookworm and sid causes a stack overflow when tested with the data file from the upstream bug

Bug#993366: atomicparsley: CVE-2021-37232 - stack overflow in APar_read64 in src/extract.cpp

2021-08-31 Thread Neil Williams
Package: atomicparsley Version: 0.9.6-2 Severity: important Tags: security upstream AtomicParsley at the version in buster, bullseye, bookworm and sid causes a stack overflow when tested with the data file from the upstream bug report for CVE-2021-37232:

Bug#988211: CVE-2021-30473

2021-06-23 Thread Neil Williams
_image.c/#L105 I'll include backported fixes for CVE-2021-303474 and CVE-2021-303475 -- Neil Williams = https://linux.codehelp.co.uk/ pgptO8X6lxqTY.pgp Description: OpenPGP digital signature