[Git][security-tracker-team/security-tracker][master] Add Debian bug references for gpac issues

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Sep 12 04:51:31 BST 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c83cbad4 by Salvatore Bonaccorso at 2023-09-11T23:33:41+02:00
Add Debian bug references for gpac issues

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -548,7 +548,7 @@ CVE-2023-4781 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to
 	NOTE: https://huntr.dev/bounties/c867eb0a-aa8b-4946-a621-510350673883/
 	NOTE: https://github.com/vim/vim/commit/f6d28fe2c95c678cc3202cc5dc825a3fcc709e93 (v9.0.1873)
 CVE-2023-4778 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://huntr.dev/bounties/abb450fb-4ab2-49b0-90da-3d878eea5397/
@@ -685,25 +685,25 @@ CVE-2023-34321 [arm32: The cache may not be properly cleaned/invalidated]
 	[buster] - xen <end-of-life> (DSA 4677-1)
 	NOTE: https://xenbits.xen.org/xsa/advisory-437.html
 CVE-2023-4758 (Buffer Over-read in GitHub repository gpac/gpac prior to 2.3-DEV.)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/193633b1648582444fc99776cd741d7ba0125e86
 	NOTE: https://huntr.dev/bounties/2f496261-1090-45ac-bc89-cc93c82090d6
 CVE-2023-4756 (Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2. ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/6914d016e2b540bac2c471c4aea156ddef8e8e01
 	NOTE: https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05
 CVE-2023-4755 (Use After Free in GitHub repository gpac/gpac prior to 2.3-DEV.)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <no-dsa> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/895ac12da168435eb8db3f96978ffa4c69d66c3a
 	NOTE: https://huntr.dev/bounties/463474b7-a4e8-42b6-8b30-e648a77ee6b3
 CVE-2023-4754 (Out-of-bounds Write in GitHub repository gpac/gpac prior to 2.3-DEV.)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/7e2e92feb1b30fac1d659f6620d743b5a188ffe0
 	NOTE: https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c
@@ -1092,17 +1092,17 @@ CVE-2023-39979 (There is a vulnerability in MXsecurity versions prior to 1.0.1 t
 CVE-2023-4718 (The Font Awesome 4 Menus plugin for WordPress is vulnerable to Stored  ...)
 	NOT-FOR-US: Font Awesome 4 Menus plugin for WordPress
 CVE-2023-4722 (Integer Overflow or Wraparound in GitHub repository gpac/gpac prior to ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/de7f3a852bef72a52825fd307cf4e8f486401a76
 	NOTE: https://huntr.dev/bounties/ddfdb41d-e708-4fec-afe5-68ff1f88f830
 CVE-2023-4721 (Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/3ec93d73d048ed7b46fe6e9f307cc7a0cc13db63
 	NOTE: https://huntr.dev/bounties/f457dc62-3cff-47bd-8fd2-1cb2b4a832fc
 CVE-2023-4720 (Floating Point Comparison with Incorrect Operator in GitHub repository ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/e396648e48c57e2d53988d3fd4465b068b96c89a
 	NOTE: https://huntr.dev/bounties/1dc2954c-8497-49fa-b2af-113e1e9381ad
@@ -1275,24 +1275,24 @@ CVE-2023-41749 (Sensitive information disclosure due to excessive collection of
 CVE-2023-39912 (Zoho ManageEngine ADManager Plus through 7202 allows admin users to do ...)
 	NOT-FOR-US: Zoho
 CVE-2023-4683 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-D ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/112767e8b178fc82dec3cf82a1ca14d802cdb8ec
 	NOTE: https://huntr.dev/bounties/7852e4d2-af4e-4421-a39e-db23e0549922
 CVE-2023-4682 (Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3 ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/b1042c3eefca87c4bc32afb404ed6518d693e5be
 	NOTE: https://huntr.dev/bounties/15232a74-e3b8-43f0-ae8a-4e89d56c474c
 CVE-2023-4681 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3-D ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/4bac19ad854159b21ba70d8ab7c4e1cd1db8ea1c
 	NOTE: https://huntr.dev/bounties/d67c5619-ab36-41cc-93b7-04828e25f60e
 CVE-2023-4678 (Divide By Zero in GitHub repository gpac/gpac prior to 2.3-DEV.)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/commit/4607052c482a51dbdacfe1ade10645c181d07b07
@@ -2064,7 +2064,7 @@ CVE-2023-39652 (theme volty tvcmsvideotab up to v4.0.0 was discovered to contain
 CVE-2023-39578 (A stored cross-site scripting (XSS) vulnerability in the Create functi ...)
 	NOT-FOR-US: Zenario CMS
 CVE-2023-39562 (GPAC v2.3-DEV-rev449-g5948e4f70-master was discovered to contain a hea ...)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://github.com/gpac/gpac/issues/2537
 	NOTE: https://github.com/gpac/gpac/commit/9024531ee8e6ae8318a8fe0cbb64710d1acc31f6
@@ -11218,7 +11218,7 @@ CVE-2023-2783 (Mattermost Apps Framework fails to verify that a secret provided
 	- mattermost-server <itp> (bug #823556)
 CVE-2023-3291 (Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2 ...)
 	{DSA-5452-1}
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5/
 	NOTE: https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf
@@ -13037,14 +13037,14 @@ CVE-2023-3015 (A vulnerability has been found in yiwent Vip Video Analysis 1.0 a
 CVE-2023-3014 (A vulnerability, which was classified as problematic, was found in Bei ...)
 	NOT-FOR-US: BeipyVideoResolution
 CVE-2023-3013 (Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2.)
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[bullseye] - gpac <ignored> (Minor issue)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073
 	NOTE: https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594
 CVE-2023-3012 (NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2 ...)
 	{DSA-5452-1}
-	- gpac <unfixed>
+	- gpac <unfixed> (bug #1051740)
 	[buster] - gpac <end-of-life> (EOL in buster LTS)
 	NOTE: https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69
 	NOTE: https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c83cbad4b035595fbfc72197a34b0deaaaef29fe

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c83cbad4b035595fbfc72197a34b0deaaaef29fe
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230912/7746bced/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list