Roberto C. Sánchez pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
bd89554d by Roberto C. Sánchez at 2022-04-01T18:46:24-04:00
LTS: mark CVE-2021-32136/gpac as <not-affected> for stretch and buster

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -58399,10 +58399,11 @@ CVE-2021-32137 (Heap buffer overflow in the 
URL_GetProtocolType function in MP4B
 CVE-2021-32136 (Heap buffer overflow in the print_udta function in MP4Box in 
GPAC 1.0. ...)
        - gpac 2.0.0+dfsg1-2
        [bullseye] - gpac <ignored> (Minor issue)
-       [buster] - gpac <ignored> (Minor issue)
-       [stretch] - gpac <ignored> (Minor issue)
+       [buster] - gpac <not-affected> (vulnerable code introduced later)
+       [stretch] - gpac <not-affected> (vulnerable code introduced later)
        NOTE: 
https://github.com/gpac/gpac/commit/eb71812fcc10e9c5348a5d1c61bd25b6fa06eaed 
(v2.0.0)
        NOTE: https://github.com/gpac/gpac/issues/1765
+       NOTE: Vulnerable code introduced by 
https://github.com/gpac/gpac/commit/eb71812fcc10e9c5348a5d1c61bd25b6fa06eaed
 CVE-2021-32135 (The trak_box_size function in GPAC 1.0.1 allows attackers to 
cause a d ...)
        - gpac 2.0.0+dfsg1-2
        [bullseye] - gpac <ignored> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bd89554da787b01bb60256f17d6ac327d09bdf0c

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/bd89554da787b01bb60256f17d6ac327d09bdf0c
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to