[Git][security-tracker-team/security-tracker][master] 2 commits: LTS: mark CVE-2020-22674/gpac as <not-affected> for buster

Roberto C. Sánchez (@roberto) roberto at debian.org
Wed Jan 5 02:48:09 GMT 2022



Roberto C. Sánchez pushed to branch master at Debian Security Tracker / security-tracker


Commits:
31c42d09 by Roberto C. Sánchez at 2022-01-04T21:40:04-05:00
LTS: mark CVE-2020-22674/gpac as <not-affected> for buster

- - - - -
c166e99d by Roberto C. Sánchez at 2022-01-04T21:47:37-05:00
LTS: mark CVE-2019-20165/gpac as <not-affected> for stretch and buster

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -94268,7 +94268,7 @@ CVE-2020-22675 (An issue was discovered in gpac 0.8.0. The GetGhostNum function
 	NOTE: https://github.com/gpac/gpac/commit/5aa8c4bbd970a3a77517b00528a596063efca1a9
 CVE-2020-22674 (An issue was discovered in gpac 0.8.0. An invalid memory dereference e ...)
 	- gpac 1.0.1+dfsg1-2
-	[buster] - gpac <ignored> (Minor issue)
+	[buster] - gpac <not-affected> (Vulnerable code introduced later, in version 0.7.0)
 	[stretch] - gpac <not-affected> (Vulnerable code introduced later, in version 0.7.0)
 	NOTE: https://github.com/gpac/gpac/issues/1346
 	NOTE: https://github.com/gpac/gpac/commit/6040a5981a9f51410bd18af8820afbd2748c2d76
@@ -139047,10 +139047,11 @@ CVE-2019-20166 (An issue was discovered in GPAC version 0.8.0 and 0.9.0-developm
 CVE-2019-20165 (An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20 ...)
 	{DLA-2072-1}
 	- gpac 1.0.1+dfsg1-2 (bug #972053)
-	[buster] - gpac <no-dsa> (Minor issue)
-	[stretch] - gpac <no-dsa> (Minor issue)
+	[buster] - gpac <not-affected> (Vulnerable code introduced later, in version 0.8.0)
+	[stretch] - gpac <not-affected> (Vulnerable code introduced later, in version 0.8.0)
 	NOTE: https://github.com/gpac/gpac/issues/1338
 	NOTE: https://github.com/gpac/gpac/commit/5250afecbc770c8f26829e9566d5b226a3c5fa80 (chunk #1)
+	NOTE: Introduced by https://github.com/gpac/gpac/commit/86d072b6a13baa1a4a90168098a0f8354c24d8cf
 CVE-2019-20164 (An issue was discovered in GPAC version 0.8.0 and 0.9.0-development-20 ...)
 	- gpac <not-affected> (Vulnerable code introduced in 0.7.0)
 	NOTE: https://github.com/gpac/gpac/issues/1332



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9160b6122b2c4bf2798e2c327d837d19f21a87e4...c166e99d404462ca25d253157cc25a3a6e62bbd4

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/9160b6122b2c4bf2798e2c327d837d19f21a87e4...c166e99d404462ca25d253157cc25a3a6e62bbd4
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220105/48b65b51/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list