[Git][security-tracker-team/security-tracker][master] Update status for CVE-2023-47470/ffmpeg
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Thu Nov 16 20:26:49 GMT 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
52930f80 by Salvatore Bonaccorso at 2023-11-16T21:25:40+01:00
Update status for CVE-2023-47470/ffmpeg
Turns out that the issue was never in a released version, neither
upstream nor in Debian. Thus mark the whole entry as not-affected
accordingly. Might be disputed at CVE level that it got a CVE.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -225,14 +225,11 @@ CVE-2023-47471 (Buffer Overflow vulnerability in strukturag libde265 v1.10.12 al
NOTE: https://github.com/strukturag/libde265/issues/426
NOTE: https://github.com/strukturag/libde265/commit/e36b4a1b0bafa53df47514c419d5be3e8916ebc7
CVE-2023-47470 (Buffer Overflow vulnerability in Ffmpeg before github commit 456574705 ...)
- - ffmpeg 7:6.1-1
- [bookworm] - ffmpeg <not-affected> (Vulnerable code not present)
- [bullseye] - ffmpeg <not-affected> (Vulnerable code not present)
- [buster] - ffmpeg <not-affected> (Vulnerable code not present)
- NOTE: https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 (n6.1)
+ - ffmpeg <not-affected> (Vulnerable code not in any Debian released version)
NOTE: https://patchwork.ffmpeg.org/project/ffmpeg/patch/20230915131147.5945-2-michael%40niedermayer.cc/
NOTE: https://github.com/goldds96/Report/tree/main/FFmpeg
- NOTE: Introduced in https://github.com/FFmpeg/FFmpeg/commit/34e4f18360c4ecb8e5979cab8f389478d8cd7819
+ NOTE: Introduced in: https://github.com/FFmpeg/FFmpeg/commit/34e4f18360c4ecb8e5979cab8f389478d8cd7819 (n6.1)
+ NOTE: Fixed by: https://github.com/FFmpeg/FFmpeg/commit/4565747056a11356210ed8edcecb920105e40b60 (n6.1)
CVE-2023-47444 (An issue discovered in OpenCart 4.0.0.0 to 4.0.2.3 allows authenticate ...)
TODO: check
CVE-2023-47347 (Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cau ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52930f8057caa7168a35837a6e341dc94215886c
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/52930f8057caa7168a35837a6e341dc94215886c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20231116/72f6e148/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list