[Git][security-tracker-team/security-tracker][master] bullseye/bookworm triage

Moritz Muehlenhoff (@jmm) jmm at debian.org
Wed Nov 8 11:37:38 GMT 2023



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1845b22c by Moritz Muehlenhoff at 2023-11-08T12:36:28+01:00
bullseye/bookworm triage

- - - - -


2 changed files:

- data/CVE/list
- data/dsa-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -926,6 +926,7 @@ CVE-2023-46930 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP
 	NOTE: https://github.com/gpac/gpac/commit/3809955065afa3da1ad580012ec43deadbb0f2c8
 CVE-2023-46928 (GPAC 2.3-DEV-rev605-gfc9e29089-master contains a SEGV in gpac/MP4Box i ...)
 	- gpac <unfixed> (bug #1055298)
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/issues/2661
 	NOTE: https://github.com/gpac/gpac/commit/0753bf6d867343a80a044bf47a27d0b7accc8bf1
@@ -3802,6 +3803,7 @@ CVE-2011-10004 (A vulnerability was found in reciply Plugin up to 1.1.7 on WordP
 	NOT-FOR-US: WordPress plugin
 CVE-2023-5595 (Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV.)
 	- gpac <unfixed> (bug #1055125)
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e
 	NOTE: https://github.com/gpac/gpac/issues/2633
@@ -4469,6 +4471,7 @@ CVE-2023-44187 (An Exposure of Sensitive Information vulnerability in the 'file
 	NOT-FOR-US: Juniper
 CVE-2023-42298 (An issue in GPAC GPAC v.2.2.1 and before allows a local attacker to ca ...)
 	- gpac <unfixed> (bug #1053878)
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/issues/2567
 	NOTE: https://github.com/gpac/gpac/commit/16c4fafc2881112eba7051cac48f922eb2b94e06
@@ -10633,6 +10636,7 @@ CVE-2023-4718 (The Font Awesome 4 Menus plugin for WordPress is vulnerable to St
 	NOT-FOR-US: Font Awesome 4 Menus plugin for WordPress
 CVE-2023-4722 (Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to ...)
 	- gpac <unfixed> (bug #1051740)
+	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/de7f3a852bef72a52825fd307cf4e8f486401a76
 	NOTE: https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830


=====================================
data/dsa-needed.txt
=====================================
@@ -60,6 +60,8 @@ python-glance-store/oldstable
 --
 python-os-brick/oldstable
 --
+redmine/stable
+--
 ring
   might make sense to rebase to current version
 --



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1845b22cc9848cecd3ab90e9732084e7787a9650

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/1845b22cc9848cecd3ab90e9732084e7787a9650
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231108/52aa6bae/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list