[Git][security-tracker-team/security-tracker][master] Update status for CVE-2023-47470/ffmpeg

Salvatore Bonaccorso (@carnil) carnil at debian.org
Thu Nov 16 20:26:49 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
52930f80 by Salvatore Bonaccorso at 2023-11-16T21:25:40+01:00
Update status for CVE-2023-47470/ffmpeg

Turns out that the issue was never in a released version, neither
upstream nor in Debian. Thus mark the whole entry as not-affected
accordingly. Might be disputed at CVE level that it got a CVE.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -225,14 +225,11 @@ CVE-2023-47471 (Buffer Overflow vulnerability in strukturag libde265 v1.10.12 al
 	NOTE: https://github.com/strukturag/libde265/issues/426
 	NOTE: https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7
 CVE-2023-47470 (Buffer Overflow vulnerability in Ffmpeg before github commit 456574705 ...)
-	- ffmpeg 7:6.1-1
-	[bookworm] - ffmpeg <not-affected> (Vulnerable code not present)
-	[bullseye] - ffmpeg <not-affected> (Vulnerable code not present)
-	[buster] - ffmpeg <not-affected> (Vulnerable code not present)
-	NOTE: https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 (n6.1)
+	- ffmpeg <not-affected> (Vulnerable code not in any Debian released version)
 	NOTE: https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael%40niedermayer.cc/
 	NOTE: https://github.com/goldds96/Report/tree/main/FFmpeg
-	NOTE: Introduced in https://github.com/FFmpeg/FFmpeg/commit/34e4f18360c4ecb8e5979cab8f389478d8cd7819
+	NOTE: Introduced in:  https://github.com/FFmpeg/FFmpeg/commit/34e4f18360c4ecb8e5979cab8f389478d8cd7819 (n6.1)
+	NOTE: Fixed by: https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 (n6.1)
 CVE-2023-47444 (An issue discovered in OpenCart 4.0.0.0 to 4.0.2.3 allows authenticate ...)
 	TODO: check
 CVE-2023-47347 (Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cau ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52930f8057caa7168a35837a6e341dc94215886c

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52930f8057caa7168a35837a6e341dc94215886c
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231116/72f6e148/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list