[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#987280: marked as done (CVE-2021-31254 CVE-2021-31255 CVE-2021-31256 CVE-2021-31257 CVE-2021-31258 CVE-2021-31259 CVE-2021-31260 CVE-2021-31261 CVE-2021-31262)



Your message dated Tue, 25 May 2021 02:19:29 +0000
with message-id <E1llMfJ-000I66-Qg@fasolo.debian.org>
and subject line Bug#987280: fixed in gpac 1.0.1+dfsg1-4
has caused the Debian Bug report #987280,
regarding CVE-2021-31254 CVE-2021-31255 CVE-2021-31256 CVE-2021-31257 CVE-2021-31258 CVE-2021-31259 CVE-2021-31260 CVE-2021-31261 CVE-2021-31262
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
987280: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987280
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: gpac
Version: 1.0.1+dfsg1-3
Severity: grave
Tags: security
X-Debbugs-Cc: Debian Security Team <team@security.debian.org>

CVE-2021-31262
https://github.com/gpac/gpac/commit/b2eab95e07cb5819375a50358d4806a8813b6e50
https://github.com/gpac/gpac/issues/1738

CVE-2021-31261
https://github.com/gpac/gpac/commit/cd3738dea038dbd12e603ad48cd7373ae0440f65
https://github.com/gpac/gpac/issues/1737

CVE-2021-31260
https://github.com/gpac/gpac/commit/df8fffd839fe5ae9acd82d26fd48280a397411d9
https://github.com/gpac/gpac/issues/1736

CVE-2021-31259
https://github.com/gpac/gpac/commit/3b84ffcbacf144ce35650df958432f472b6483f8
https://github.com/gpac/gpac/issues/1735

CVE-2021-31258
https://github.com/gpac/gpac/commit/ebfa346eff05049718f7b80041093b4c5581c24e
https://github.com/gpac/gpac/issues/1706

CVE-2021-31257
https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0
https://github.com/gpac/gpac/issues/1734

CVE-2021-31256
https://github.com/gpac/gpac/commit/2da2f68bffd51d89b1d272d22aa8cc023c1c066e
https://github.com/gpac/gpac/issues/1705

CVE-2021-31255
https://github.com/gpac/gpac/commit/758135e91e623d7dfe7f6aaad7aeb3f791b7a4e5
https://github.com/gpac/gpac/issues/1733

CVE-2021-31254
https://github.com/gpac/gpac/commit/8986422c21fbd9a7bf6561cae65aae42077447e8
https://github.com/gpac/gpac/issues/1703

Cheers,
        Moritz	

--- End Message ---
--- Begin Message ---
Source: gpac
Source-Version: 1.0.1+dfsg1-4
Done: Reinhard Tartler <siretart@tauware.de>

We believe that the bug you reported is fixed in the latest version of
gpac, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 987280@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Reinhard Tartler <siretart@tauware.de> (supplier of updated gpac package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Mon, 24 May 2021 21:09:10 -0400
Source: gpac
Architecture: source
Version: 1.0.1+dfsg1-4
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers <debian-multimedia@lists.debian.org>
Changed-By: Reinhard Tartler <siretart@tauware.de>
Closes: 987280 987323 987374
Changes:
 gpac (1.0.1+dfsg1-4) unstable; urgency=medium
 .
   [ Moritz Muehlenhoff ]
   * Cherrypicked fixes for multiple security issues:
     (Closes: #987280, #987323, #987374)
     - CVE-2021-30014/CVE-2021-30020/CVE-2021-30022
     - CVE-2020-35979
     - CVE-2020-35981
     - CVE-2020-35982
     - CVE-2021-28300
     - CVE-2021-29279
     - CVE-2021-31255
     - CVE-2021-31256
     - CVE-2021-31261
     - CVE-2021-30015
     - CVE-2021-30019
     - CVE-2021-30199
     - CVE-2021-31257
     - CVE-2021-31258
     - CVE-2021-31260
     - CVE-2021-31262
 .
   [ Reinhard Tartler ]
   * upload to unstable
Checksums-Sha1:
 1128f53457ca2a28f393901a581173c7fe934acf 2701 gpac_1.0.1+dfsg1-4.dsc
 8522ee622dd8588bc681c8ab271d86d768e15f41 41604 gpac_1.0.1+dfsg1-4.debian.tar.xz
Checksums-Sha256:
 dbbad33437d44fa6a260635a5533c04348e2e2c3a8f49f6d56aca98454cea7a4 2701 gpac_1.0.1+dfsg1-4.dsc
 1552418a0caefa859e6393ac5a6e029c53145b5eec05d7aa07609d3fc42538ad 41604 gpac_1.0.1+dfsg1-4.debian.tar.xz
Files:
 72e4ea906f6fe29d9a95a5e7f0d14cbf 2701 graphics optional gpac_1.0.1+dfsg1-4.dsc
 f3769d6e6d4dc5404f3ecb08b13779da 41604 graphics optional gpac_1.0.1+dfsg1-4.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=0amP
-----END PGP SIGNATURE-----

--- End Message ---

Reply to: