Package: ccextractor Version: 0.93+ds1-1 Severity: grave Tags: security upstream Justification: user security hole X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
ccextractor embeds source code from the gpac project. Some files are moved and some files are omitted but the files that remain match the equivalent files in gpac. In unstable, ccextractor 0.93 embeds gpac 1.0.1. This embedding has not been declared to the security team and is not listed on the embedded copies wiki page (yet). I have a local build which adds gpac to the existing list of ccextractor dependencies which are removed from the ccextractor source and replaced with a dependency on libgpac10. This will resolve this bug for unstable and for bookworm. The problem affects older versions of ccextractor as well. Version 0.88 and 0.87 of ccextractor embed gpac code in a similar fashion, from gpac 0.7.1 - a version which was packaged for Debian but did not make it into a stable release. Buster and bullseye have gpac version 0.52, with some additions. Version 0.52 of gpac is not used in ccextractor. ccextractor in buster and bullseye therefore embeds newer gpac code than is currently available in the binaries built from gpac in buster or bullseye. It is likely that buster and bullseye would need separate updates to patch the vulnerabilities directly into the embedded gpac code at v0.7.1 - it should probably be the same patch for each. Additionally, not all source code files from gpac are embedded into ccextractor - an AppWizard was used to trim the source to the functionality expected by the ccextractor upstream. Some CVEs which affect gpac do not therefore affect ccextractor as the vulnerable source code has been removed during the embedding process by ccextractor upstream. An initial check of the ccextractor source code in buster showed that the following CVEs are applicable to ccextractor in buster and therefore in bullseye, via embedded gpac code at gpac version 0.7.1. CVE-2021-33362 CVE-2021-32440 CVE-2021-32139 CVE-2021-32137 CVE-2021-32134 CVE-2021-31260 CVE-2021-31258 CVE-2021-30014 CVE-2021-28300 CVE-2021-21852 CVE-2020-35981 CVE-2020-35980 CVE-2020-24829 CVE-2020-19751 CVE-2020-6631 CVE-2020-6630 CVE-2019-20208 CVE-2019-20171 CVE-2019-20170 CVE-2019-20162 CVE-2019-20161 CVE-2019-13618 CVE-2019-12483 CVE-2019-12482 CVE-2019-12481 CVE-2018-21015 -- System Information: Debian Release: bookworm/sid APT prefers unstable APT policy: (500, 'unstable'), (1, 'experimental') Architecture: amd64 (x86_64) Kernel: Linux 5.10.0-8-amd64 (SMP w/16 CPU threads) Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB:en Shell: /bin/sh linked to /usr/bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages ccextractor depends on: ii libavcodec58 7:4.4-6+b1 ii libavformat58 7:4.4-6+b1 ii libavutil56 7:4.4-6+b1 ii libc6 2.32-3 ii libfreetype6 2.10.4+dfsg-1 ii liblept5 1.79.0-1.1 ii libpng16-16 1.6.37-3 ii libswscale5 7:4.4-6+b1 ii libtesseract4 4.1.1-2.1 ii libutf8proc2 2.5.0-1 ii zlib1g 1:1.2.11.dfsg-2 ccextractor recommends no packages. ccextractor suggests no packages. -- no debconf information

