Hi,

On 08/08/2024 15:20, Santiago Ruano Rincón wrote:
El 08/08/24 a las 11:56, Sylvain Beucler escribió:
Since then:
- gpac was EOLd in buster
https://salsa.debian.org/debian/debian-security-support/-/commit/a0bfdf01d404aba46893d2971d776f8f7fb5337e
- gpac was removed from bookworm
https://tracker.debian.org/news/1430135/gpac-removed-from-testing/
- gpac was removed from sid
https://tracker.debian.org/news/1548977/removed-221dfsg1-31-from-unstable/

gpac in bullseye still has >100 open CVEs and I don't believe the situation
described by Roberto improved.

Do we want to mark gpac EOL for bullseye as well?

I think it makes sense, yes. Would you like to proceed and document
this in d-d-s?

Here is the MR :)
https://salsa.debian.org/debian/debian-security-support/-/merge_requests/27

For reference, a few more details about the gpac package:

- bookworm removal BTS with rationale:
  RM: gpac/2.0.0+dfsg1-4
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034798

- bullseye rdeps:
  x264 (high popcon)
  ogmrip (not in bookworm and trixie)

- x264 impact: output to .mp4 in 'x264' cli utility (not 'libx264')
  recompiled without gpac/.mp4 output support in bookworm and later, cf:
  unblock: x264/2:0.164.3095+gitbaee400-3
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034653
  gpac/bullseye will not handle arbitrary data,
    but rather data produced by x264
  security impact limited

- 112 open CVEs

- 3 past bullseye updates:
  DSA-4966-1 [31 Aug 2021] (24 CVEs)
  DSA-5411-1 [26 May 2023] (113 CVEs)
  DSA-5452-1 [14 Jul 2023] (3 CVEs)

Cheers!
Sylvain Beucler
Debian LTS Team

Reply via email to