Bug#1051955: marked as done (gpac: CVE-2023-41000)
Your message dated Sat, 27 Jul 2024 18:34:22 +0000
with message-id <[🔎] E1sXmFK-00AlG4-Dj@fasolo.debian.org>
and subject line Bug#1076113: Removed package(s) from unstable
has caused the Debian Bug report #1051955,
regarding gpac: CVE-2023-41000
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)
--
1051955: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1051955
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: gpac: CVE-2023-41000
- From: Salvatore Bonaccorso <carnil@debian.org>
- Date: Thu, 14 Sep 2023 21:02:44 +0200
- Message-id: <169471816498.1223137.18269814954169615036.reportbug@eldamar.lan>
Source: gpac
Version: 2.2.1+dfsg1-3
Severity: grave
Tags: security upstream
Justification: user security hole
Forwarded: https://github.com/gpac/gpac/issues/2550
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Hi,
The following vulnerability was published for gpac.
CVE-2023-41000[0]:
| GPAC through 2.2.1 has a use-after-free vulnerability in the
| function gf_bifs_flush_command_list in bifs/memory_decoder.c.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-41000
https://www.cve.org/CVERecord?id=CVE-2023-41000
[1] https://github.com/gpac/gpac/issues/2550
[2] https://github.com/gpac/gpac/commit/0018b5e4e07a1465287e7dff69b387929f5a75fa
Please adjust the affected versions in the BTS as needed.
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
- To: 782125-done@bugs.debian.org,786733-done@bugs.debian.org,1034732-done@bugs.debian.org,1034890-done@bugs.debian.org,1036701-done@bugs.debian.org,1041421-done@bugs.debian.org,1051740-done@bugs.debian.org,1051866-done@bugs.debian.org,1051955-done@bugs.debian.org,1053878-done@bugs.debian.org,1055122-done@bugs.debian.org,1055124-done@bugs.debian.org,1055125-done@bugs.debian.org,1055298-done@bugs.debian.org,1056282-done@bugs.debian.org,1059056-done@bugs.debian.org,1060043-done@bugs.debian.org,1060409-done@bugs.debian.org,1060696-done@bugs.debian.org,1065861-done@bugs.debian.org,1068462-done@bugs.debian.org,1072419-done@bugs.debian.org,1074414-done@bugs.debian.org,1038784-done@bugs.debian.org,
- Cc: gpac@packages.debian.org
- Subject: Bug#1076113: Removed package(s) from unstable
- From: Debian FTP Masters <ftpmaster@ftp-master.debian.org>
- Date: Sat, 27 Jul 2024 18:34:22 +0000
- Message-id: <[🔎] E1sXmFK-00AlG4-Dj@fasolo.debian.org>
Version: 2.2.1+dfsg1-3.1+rm
Dear submitter,
as the package gpac has just been removed from the Debian archive
unstable we hereby close the associated bug reports. We are sorry
that we couldn't deal with your issue properly.
For details on the removal, please see https://bugs.debian.org/1076113
The version of this package that was in Debian prior to this removal
can still be found using https://snapshot.debian.org/.
Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.
This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmaster@ftp-master.debian.org.
Debian distribution maintenance software
pp.
Scott Kitterman (the ftpmaster behind the curtain)
--- End Message ---
Reply to: