[Git][security-tracker-team/security-tracker][master] Add upstream tag information for CVE-2021-322{68,69,70,71}

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Sep 21 20:22:35 BST 2021



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
ed789f2e by Salvatore Bonaccorso at 2021-09-21T21:21:53+02:00
Add upstream tag information for CVE-2021-322{68,69,70,71}

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -21559,25 +21559,24 @@ CVE-2021-32272 (An issue was discovered in faad2 through 2.10.0. A heap-buffer-o
 	NOTE: https://github.com/knik0/faad2/commit/1b71a6ba963d131375f5e489b3b25e36f19f3f24 (2_10_0)
 CVE-2021-32271 (An issue was discovered in gpac through 20200801. A stack-buffer-overf ...)
 	- gpac 1.0.1+dfsg1-2
-	NOTE: https://github.com/gpac/gpac/commit/71f1d75eaf71f47944ddbd9356fb498ca252b19a
+	NOTE: https://github.com/gpac/gpac/commit/71f1d75eaf71f47944ddbd9356fb498ca252b19a (v1.0.1)
 	NOTE: https://github.com/gpac/gpac/issues/1575
 CVE-2021-32270 (An issue was discovered in gpac through 20200801. A NULL pointer deref ...)
 	- gpac 1.0.1+dfsg1-2
 	[buster] - gpac <not-affected> (Vulnerable code not present)
 	[stretch] - gpac <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/gpac/gpac/issues/1586
-	NOTE: https://github.com/gpac/gpac/commit/362fc486b5c0eea04f26793d5623f6a9272bd85a
+	NOTE: https://github.com/gpac/gpac/commit/362fc486b5c0eea04f26793d5623f6a9272bd85a (v1.0.1)
 CVE-2021-32269 (An issue was discovered in gpac through 20200801. A NULL pointer deref ...)
 	- gpac 1.0.1+dfsg1-2
 	[buster] - gpac <not-affected> (Vulnerable code not present)
 	[stretch] - gpac <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/gpac/gpac/issues/1574
-	NOTE: https://github.com/gpac/gpac/commit/fc4d8f594acfd97fc750403cca734671bb623afc
+	NOTE: https://github.com/gpac/gpac/commit/fc4d8f594acfd97fc750403cca734671bb623afc (v1.0.1)
 CVE-2021-32268 (Buffer overflow vulnerability in function gf_fprintf in os_file.c in g ...)
-	TODO: check
 	- gpac 1.0.1+dfsg1-2
 	NOTE: https://github.com/gpac/gpac/issues/1587
-	NOTE: https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e
+	NOTE: https://github.com/gpac/gpac/commit/388ecce75d05e11fc8496aa4857b91245007d26e (v1.0.1)
 CVE-2021-32267
 	RESERVED
 CVE-2021-32266



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed789f2eb4745525ee69beb5669fb6f7376770d1

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ed789f2eb4745525ee69beb5669fb6f7376770d1
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20210921/1c4f2a2d/attachment.htm>


More information about the debian-security-tracker-commits mailing list