Source: milkytracker
Version: 1.03.00+dfsg-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team
Hi,
The following vulnerability was published for milkytracker.
CVE-2022-34927[0]:
| MilkyTracker v1.03.00 was discovered to contain a stack overflow
Source: gpac
Version: 1.0.1+dfsg1-5
Severity: important
Tags: security upstream
X-Debbugs-Cc: codeh...@debian.org, Debian Security Team
A security vulnerability exists in gpac at version 1.0.1+dfsg1-5.
(Vulnerable code was introduced after the version currently in buster
but remains present in t
On Wed, 1 Sep 2021 12:08:16 +0300
Adrian Bunk wrote:
> On Wed, Sep 01, 2021 at 09:32:09AM +0100, Neil Williams wrote:
> >...
> > Hi Adrian.
>
> Hi Neil,
>
> > Sorry, No. The commit linked to CVE-2021-37232 does not even fix the
> > problem descri
On Wed, 1 Sep 2021 11:05:09 +0300
Adrian Bunk wrote:
> Control: tags 993378 moreinfo
>
> On Tue, Aug 31, 2021 at 03:49:45PM +0100, Neil Williams wrote:
> > Package: ftp.debian.org
> > Severity: normal
> >
> > gtkpod upstream has moved but has not had
Package: atomicparsley
Version: 0.9.6-2
Severity: important
Tags: patch security
https://github.com/wez/atomicparsley/issues/30
See also #993366
AtomicParsley, at the version in buster, bullseye, bookworm and sid causes a
stack
overflow when tested with the data file from the upstream bug repor
Package: atomicparsley
Version: 0.9.6-2
Severity: important
Tags: security upstream
AtomicParsley at the version in buster, bullseye, bookworm and sid causes a
stack overflow
when tested with the data file from the upstream bug report for CVE-2021-37232:
https://github.com/wez/atomicparsley/issu
c/aom_image.c/#L105
I'll include backported fixes for CVE-2021-303474 and CVE-2021-303475
--
Neil Williams
=
https://linux.codehelp.co.uk/
pgptO8X6lxqTY.pgp
Description: OpenPGP digital signature
7 matches
Mail list logo