[Git][security-tracker-team/security-tracker][master] Add upstream tag information for CVE-2021-322{68,69,70,71}
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Sep 21 20:22:35 BST 2021
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
ed789f2e by Salvatore Bonaccorso at 2021-09-21T21:21:53+02:00
Add upstream tag information for CVE-2021-322{68,69,70,71}
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -21559,25 +21559,24 @@ CVE-2021-32272 (An issue was discovered in faad2 through 2.10.0. A heap-buffer-o
NOTE: https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24 (2_10_0)
CVE-2021-32271 (An issue was discovered in gpac through 20200801. A stack-buffer-overf ...)
- gpac 1.0.1+dfsg1-2
- NOTE: https://github.com/gpac/gpac/commit/71f1d75eaf71f47944ddbd9356fb498ca252b19a
+ NOTE: https://github.com/gpac/gpac/commit/71f1d75eaf71f47944ddbd9356fb498ca252b19a (v1.0.1)
NOTE: https://github.com/gpac/gpac/issues/1575
CVE-2021-32270 (An issue was discovered in gpac through 20200801. A NULL pointer deref ...)
- gpac 1.0.1+dfsg1-2
[buster] - gpac <not-affected> (Vulnerable code not present)
[stretch] - gpac <not-affected> (Vulnerable code not present)
NOTE: https://github.com/gpac/gpac/issues/1586
- NOTE: https://github.com/gpac/gpac/commit/362fc486b5c0eea04f26793d5623f6a9272bd85a
+ NOTE: https://github.com/gpac/gpac/commit/362fc486b5c0eea04f26793d5623f6a9272bd85a (v1.0.1)
CVE-2021-32269 (An issue was discovered in gpac through 20200801. A NULL pointer deref ...)
- gpac 1.0.1+dfsg1-2
[buster] - gpac <not-affected> (Vulnerable code not present)
[stretch] - gpac <not-affected> (Vulnerable code not present)
NOTE: https://github.com/gpac/gpac/issues/1574
- NOTE: https://github.com/gpac/gpac/commit/fc4d8f594acfd97fc750403cca734671bb623afc
+ NOTE: https://github.com/gpac/gpac/commit/fc4d8f594acfd97fc750403cca734671bb623afc (v1.0.1)
CVE-2021-32268 (Buffer overflow vulnerability in function gf_fprintf in os_file.c in g ...)
- TODO: check
- gpac 1.0.1+dfsg1-2
NOTE: https://github.com/gpac/gpac/issues/1587
- NOTE: https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e
+ NOTE: https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e (v1.0.1)
CVE-2021-32267
RESERVED
CVE-2021-32266
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed789f2eb4745525ee69beb5669fb6f7376770d1
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed789f2eb4745525ee69beb5669fb6f7376770d1
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210921/1c4f2a2d/attachment.htm>
More information about the debian-security-tracker-commits
mailing list