[Git][security-tracker-team/security-tracker][master] 5 commits: Fix link for CVE-2026-3950 and mark Bullseye as not affected

Daniel Leidert (@dleidert) dleidert at debian.org
Sun Mar 15 19:10:20 GMT 2026



Daniel Leidert pushed to branch master at Debian Security Tracker / security-tracker


Commits:
1ad649c8 by Daniel Leidert at 2026-03-15T19:26:11+01:00
Fix link for CVE-2026-3950 and mark Bullseye as not affected

- - - - -
4d9e2c4d by Daniel Leidert at 2026-03-15T19:45:28+01:00
lts: mark CVE-2026-3731/libssh as postponed

- - - - -
be18a96d by Daniel Leidert at 2026-03-15T19:48:36+01:00
dla-needed: add gst-plugins-base1.0 also in dsa-needed

- - - - -
0c591523 by Daniel Leidert at 2026-03-15T19:57:54+01:00
lts: mark gpac as EOL

- - - - -
12c93ca0 by Daniel Leidert at 2026-03-15T20:07:48+01:00
lts: mark CVE-2026-4105/bullseye as postponed

- - - - -


2 changed files:

- data/CVE/list
- data/dla-needed.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -606,6 +606,7 @@ CVE-2026-4105 (A flaw was found in systemd. The systemd-machined service contain
 	- systemd 260~rc3-1
 	[trixie] - systemd <no-dsa> (Only exloitable with custom polkit policy that allows register-machine access)
 	[bookworm] - systemd <no-dsa> (Only exloitable with custom polkit policy that allows register-machine access)
+	[bullseye] - systemd <postponed> (Only exloitable with custom polkit policy that allows register-machine access)
 	NOTE: https://github.com/systemd/systemd/security/advisories/GHSA-4h6x-r8vx-3862
 	NOTE: Introduced with: https://github.com/systemd/systemd/commit/fbe550738d03b178bb004a1390e74115e904118a (v225)
 	NOTE: Fixed by: https://github.com/systemd/systemd/commit/6df5f80bd374be1b45c52d740e88f0236da922c7 (v260-rc3)
@@ -745,10 +746,12 @@ CVE-2026-4039 (A vulnerability was determined in OpenClaw 2026.2.19-2. This vuln
 	NOT-FOR-US: OpenClaw
 CVE-2026-4016 (A security vulnerability has been detected in GPAC 26.03-DEV. Affected ...)
 	- gpac <removed>
+	[bullseye] - gpac <end-of-life>
 	NOTE: https://github.com/gpac/gpac/issues/3468
 	NOTE: https://github.com/gpac/gpac/commit/7618d7206cdeb3c28961dc97ab0ecabaff0c8af2
 CVE-2026-4015 (A weakness has been identified in GPAC 26.03-DEV. Affected is the func ...)
 	- gpac <removed>
+	[bullseye] - gpac <end-of-life>
 	NOTE: https://github.com/gpac/gpac/issues/3467
 	NOTE: https://github.com/gpac/gpac/commit/d29f6f1ada5cc284cdfa783b6f532c7d8bd049a5
 CVE-2026-3989 (SGLangs `replay_request_dump.py` contains an insecure pickle.load() wi ...)
@@ -1335,8 +1338,10 @@ CVE-2026-3950 (A vulnerability was identified in strukturag libheif up to 1.21.2
 	- libheif <unfixed> (bug #1130640)
 	[trixie] - libheif <not-affected> (Vulnerable code not present)
 	[bookworm] - libheif <not-affected> (Vulnerable code not present)
-	NOTE: Introduced after: https://github.com/strukturag/libheif/content/16e205f12bfe9a3717ca1d3b447fa83f66bc87e9 (v1.20.0)
+	[bullseye] - libheif <not-affected> (Vulnerable code not present)
+	NOTE: Introduced after: https://github.com/strukturag/libheif/commit/16e205f12bfe9a3717ca1d3b447fa83f66bc87e9 (v1.20.0)
 	NOTE: https://github.com/strukturag/libheif/issues/1715
+	NOTE: Fixed by: https://github.com/strukturag/libheif/pull/1721
 CVE-2026-3949 (A vulnerability was determined in strukturag libheif up to 1.21.2. Thi ...)
 	- libheif <unfixed> (unimportant)
 	NOTE: https://github.com/strukturag/libheif/issues/1712
@@ -3155,6 +3160,7 @@ CVE-2026-3731 (A weakness has been identified in libssh up to 0.11.3. The impact
 	- libssh 0.12.0-1 (bug #1127693)
 	[trixie] - libssh <no-dsa> (Minor issue)
 	[bookworm] - libssh <no-dsa> (Minor issue)
+	[bullseye] - libssh <postponed> (Minor issue)
 	NOTE: https://www.libssh.org/security/advisories/libssh-2026-sftp-extensions.txt
 	NOTE: Fixed by: https://git.libssh.org/projects/libssh.git/commit/?id=f80670a7aba86cbb442c9b115c9eaf4ca04601b8 (libssh-0.11.4)
 	NOTE: Testcase: https://git.libssh.org/projects/libssh.git/commit/?id=02c6f5f7ec8629a7cff6a28cde9701ab10304540 (libssh-0.11.4)


=====================================
data/dla-needed.txt
=====================================
@@ -163,6 +163,10 @@ grub2
   NOTE: 20251129: Maintainer (jak) replied: work underway, proposed to skip next point release (2026-01, too soon)
   NOTE: 20251129: also uncertainty on whether a shim/SBAT (revocation) update is feasible/needed.
 --
+gst-plugins-base1.0
+  NOTE: 20260315: Added by Front-Desk (dleidert)
+  NOTE: 20260315: Follow DSA when released (dleidert/front-desk)
+--
 gvfs
   NOTE: 20260228: Added by Front-Desk (charles)
   NOTE: 20260228: CVE-2026-28296 is the greater problem, users connecting to a



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d2362fe49158d13456a623e1dcc4b00885be27d5...12c93ca0eab0a1a3d017ee95597a258a6543767e

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/d2362fe49158d13456a623e1dcc4b00885be27d5...12c93ca0eab0a1a3d017ee95597a258a6543767e
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20260315/e3b083b1/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list