Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
88ee82f7 by Salvatore Bonaccorso at 2022-10-16T18:18:03+02:00
Track CVE fixes for libde2565 via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -38379,7 +38379,7 @@ CVE-2022-1255 (The Import and export users and 
customers WordPress plugin before
 CVE-2022-1254 (A URL redirection vulnerability in Skyhigh SWG in main releases 
10.x p ...)
        NOT-FOR-US: Skyhigh SWG
 CVE-2022-1253 (Heap-based Buffer Overflow in GitHub repository 
strukturag/libde265 pr ...)
-       - libde265 <unfixed> (bug #1014977)
+       - libde265 1.0.8-1.1 (bug #1014977)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        [buster] - libde265 <no-dsa> (Minor issue)
        [stretch] - libde265 <no-dsa> (Minor issue)
@@ -89287,14 +89287,14 @@ CVE-2021-36412 (A heap-based buffer overflow 
vulnerability exists in MP4Box in G
        NOTE: https://github.com/gpac/gpac/issues/1838
        NOTE: 
https://github.com/gpac/gpac/commit/828188475084db87cebc34208b6bd2509709845e 
(v2.0.0)
 CVE-2021-36411 (An issue has been found in libde265 v1.0.8 due to incorrect 
access con ...)
-       - libde265 <unfixed> (bug #1014977)
+       - libde265 1.0.8-1.1 (bug #1014977)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        [buster] - libde265 <no-dsa> (Minor issue)
        [stretch] - libde265 <no-dsa> (Minor issue)
        NOTE: https://github.com/strukturag/libde265/issues/302
        NOTE: 
https://github.com/strukturag/libde265/commit/45904e5667c5bf59c67fcdc586dfba110832894c
 CVE-2021-36410 (A stack-buffer-overflow exists in libde265 v1.0.8 via 
fallback-motion. ...)
-       - libde265 <unfixed> (bug #1014977)
+       - libde265 1.0.8-1.1 (bug #1014977)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        [buster] - libde265 <no-dsa> (Minor issue)
        [stretch] - libde265 <no-dsa> (Minor issue)
@@ -89303,14 +89303,14 @@ CVE-2021-36410 (A stack-buffer-overflow exists in 
libde265 v1.0.8 via fallback-m
 CVE-2021-3641 (Improper Link Resolution Before File Access ('Link Following') 
vulnera ...)
        NOT-FOR-US: Bitdefender
 CVE-2021-36409 (There is an Assertion `scaling_list_pred_matrix_id_delta==1' 
failed at ...)
-       - libde265 <unfixed> (bug #1014977)
+       - libde265 1.0.8-1.1 (bug #1014977)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        [buster] - libde265 <no-dsa> (Minor issue)
        [stretch] - libde265 <no-dsa> (Minor issue)
        NOTE: https://github.com/strukturag/libde265/issues/300
        NOTE: 
https://github.com/strukturag/libde265/commit/64d591a6c70737604ca3f5791736fc462cbe8a3c
 CVE-2021-36408 (An issue was discovered in libde265 v1.0.8.There is a 
Heap-use-after-f ...)
-       - libde265 <unfixed> (bug #1014977)
+       - libde265 1.0.8-1.1 (bug #1014977)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        [buster] - libde265 <no-dsa> (Minor issue)
        [stretch] - libde265 <no-dsa> (Minor issue)
@@ -91744,7 +91744,7 @@ CVE-2021-35454
 CVE-2021-35453
        RESERVED
 CVE-2021-35452 (An Incorrect Access Control vulnerability exists in libde265 
v1.0.8 du ...)
-       - libde265 <unfixed> (bug #1014977)
+       - libde265 1.0.8-1.1 (bug #1014977)
        [bullseye] - libde265 <no-dsa> (Minor issue)
        [buster] - libde265 <no-dsa> (Minor issue)
        [stretch] - libde265 <postponed> (Minor issue, revisit when fixed 
upstream)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/88ee82f7643d378340eb4cd0b315e0b13867e9dd

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/88ee82f7643d378340eb4cd0b315e0b13867e9dd
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to