[Git][security-tracker-team/security-tracker][master] Add four new gpac issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Wed Jul 12 21:00:42 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3ae9f8a2 by Salvatore Bonaccorso at 2023-07-12T21:59:48+02:00
Add four new gpac issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -98,11 +98,17 @@ CVE-2023-3023 (The WP EasyCart plugin for WordPress is vulnerable to time-based
 CVE-2023-3011 (The ARMember plugin for WordPress is vulnerable to Cross-Site Request  ...)
 	NOT-FOR-US: ARMember plugin for WordPress
 CVE-2023-37767 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
-	TODO: check
+	- gpac <unfixed>
+	NOTE: https://github.com/gpac/gpac/issues/2514
+	NOTE: https://github.com/gpac/gpac/commit/d414df635c773b21bbb3a9fbf17b101b1e8ea345
 CVE-2023-37766 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
-	TODO: check
+	- gpac <unfixed>
+	NOTE: https://github.com/gpac/gpac/issues/2516
+	NOTE: https://github.com/gpac/gpac/commit/a64c60ef0983be6db8ab1e4a663e0ce83ff7bf2c
 CVE-2023-37765 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
-	TODO: check
+	- gpac <unfixed>
+	NOTE: https://github.com/gpac/gpac/issues/2515
+	NOTE: https://github.com/gpac/gpac/commit/36e1b9900ff638576cb88636bbbe2116ed06dfdc
 CVE-2023-37200 (A CWE-611: Improper Restriction of XML External Entity Reference vulne ...)
 	NOT-FOR-US: Schneider Electric
 CVE-2023-37199 (A CWE-94: Improper Control of Generation of Code ('Code Injection') vu ...)
@@ -114,7 +120,9 @@ CVE-2023-37197 (A CWE-89: Improper Neutralization of Special Elements vulnerabil
 CVE-2023-37196 (A CWE-89: Improper Neutralization of Special Elements vulnerability us ...)
 	NOT-FOR-US: Schneider Electric
 CVE-2023-37174 (GPAC v2.3-DEV-rev381-g817a848f6-master was discovered to contain a seg ...)
-	TODO: check
+	- gpac <unfixed>
+	NOTE: https://github.com/gpac/gpac/issues/2505
+	NOTE: https://github.com/gpac/gpac/commit/549ff4484246f2bc4d5fec6760332b43774db483
 CVE-2023-32200 (There is insufficient restrictions of called script functions in Apach ...)
 	- apache-jena <unfixed>
 	NOTE: https://www.openwall.com/lists/oss-security/2023/07/11/11



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ae9f8a2615f905260ad8e6b5ff478d4585410b4

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3ae9f8a2615f905260ad8e6b5ff478d4585410b4
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230712/17bff8dc/attachment.htm>


More information about the debian-security-tracker-commits mailing list