[Git][security-tracker-team/security-tracker][master] Reserve DLA-3240-1 for libde2565.
Tobias Frost (@tobi)
tobi at debian.org
Thu Dec 15 16:55:14 GMT 2022
Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker
Commits:
adaa8a72 by Tobias Frost at 2022-12-15T17:54:53+01:00
Reserve DLA-3240-1 for libde2565.
- - - - -
3 changed files:
- data/CVE/list
- data/DLA/list
- data/dla-needed.txt
Changes:
=====================================
data/CVE/list
=====================================
@@ -105788,14 +105788,12 @@ CVE-2021-36412 (A heap-based buffer overflow vulnerability exists in MP4Box in G
CVE-2021-36411 (An issue has been found in libde265 v1.0.8 due to incorrect access con ...)
- libde265 1.0.8-1.1 (bug #1014977)
[bullseye] - libde265 <no-dsa> (Minor issue)
- [buster] - libde265 <no-dsa> (Minor issue)
[stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/302
NOTE: https://github.com/strukturag/libde265/commit/45904e5667c5bf59c67fcdc586dfba110832894c
CVE-2021-36410 (A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion. ...)
- libde265 1.0.8-1.1 (bug #1014977)
[bullseye] - libde265 <no-dsa> (Minor issue)
- [buster] - libde265 <no-dsa> (Minor issue)
[stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/301
NOTE: https://github.com/strukturag/libde265/commit/697aa4f7c774abd6374596e6707a6f4f54265355
@@ -105804,14 +105802,12 @@ CVE-2021-3641 (Improper Link Resolution Before File Access ('Link Following') vu
CVE-2021-36409 (There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at ...)
- libde265 1.0.8-1.1 (bug #1014977)
[bullseye] - libde265 <no-dsa> (Minor issue)
- [buster] - libde265 <no-dsa> (Minor issue)
[stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/300
NOTE: https://github.com/strukturag/libde265/commit/64d591a6c70737604ca3f5791736fc462cbe8a3c
CVE-2021-36408 (An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-f ...)
- libde265 1.0.8-1.1 (bug #1014977)
[bullseye] - libde265 <no-dsa> (Minor issue)
- [buster] - libde265 <no-dsa> (Minor issue)
[stretch] - libde265 <no-dsa> (Minor issue)
NOTE: https://github.com/strukturag/libde265/issues/299
NOTE: https://github.com/strukturag/libde265/commit/f538254e4658ef5ea4e233c2185dcbfd165e8911
@@ -108248,7 +108244,6 @@ CVE-2021-35453
CVE-2021-35452 (An Incorrect Access Control vulnerability exists in libde265 v1.0.8 du ...)
- libde265 1.0.8-1.1 (bug #1014977)
[bullseye] - libde265 <no-dsa> (Minor issue)
- [buster] - libde265 <no-dsa> (Minor issue)
[stretch] - libde265 <postponed> (Minor issue, revisit when fixed upstream)
NOTE: https://github.com/strukturag/libde265/issues/298
NOTE: https://github.com/strukturag/libde265/commit/e83f3798dd904aa579425c53020c67e03735138d
@@ -174266,7 +174261,6 @@ CVE-2020-21600 (libde265 v1.0.4 contains a heap buffer overflow in the put_weigh
CVE-2020-21599 (libde265 v1.0.4 contains a heap buffer overflow in the de265_image::av ...)
- libde265 1.0.9-1 (bug #1014999)
[bullseye] - libde265 <no-dsa> (Minor issue)
- [buster] - libde265 <postponed> (Minor issue, revisit when fixed upstream)
[stretch] - libde265 <postponed> (Minor issue, revisit when fixed upstream)
NOTE: https://github.com/strukturag/libde265/issues/235
NOTE: https://github.com/strukturag/libde265/commit/a3f1c6a0dea2b0d4a531255ad06ed40cdb184d25 (v1.0.9)
=====================================
data/DLA/list
=====================================
@@ -1,3 +1,6 @@
+[15 Dec 2022] DLA-3240-1 libde265 - security update
+ {CVE-2020-21599 CVE-2021-35452 CVE-2021-36408 CVE-2021-36409 CVE-2021-36410 CVE-2021-36411}
+ [buster] - libde265 1.0.3-1+deb10u1
[14 Dec 2022] DLA-3239-2 git - regression update
[buster] - git 1:2.20.1-2+deb10u6
[13 Dec 2022] DLA-3239-1 git - security update
=====================================
data/dla-needed.txt
=====================================
@@ -101,10 +101,11 @@ lava
libapreq2
NOTE: 20221031: Programming language: C.
--
-libde265 (tobi)
+libde265
NOTE: 20221107: Programming language: C++.
NOTE: 20221107: Most vulnerabilities unfixed upstream, but a handful are fixed, and v1.0.9 (2022-10) is a security release (Beuc/front-desk)
NOTE: 20221107: No prior DSA/DLA/ELA afaics (Beuc/front-desk)
+ NOTE: 20221215: CVE-2020-21599 CVE-2021-35452 CVE-2021-36408 CVE-2021-36409 CVE-2021-36410 CVE-2021-36411 adressed, remaining CVEs are unfixed upstream. (I've proposed a patch upstream, waiting for feeback) (tobi)
--
libetpan
NOTE: 20221203: Programming language: C++.
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/adaa8a72fbc42f75f0d2279f575267e422f6ce21
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/adaa8a72fbc42f75f0d2279f575267e422f6ce21
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221215/688e6e45/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list