Your message dated Sat, 21 Nov 2020 22:34:07 +0000
with message-id <e1kgbsj-00076u...@fasolo.debian.org>
and subject line Bug#972053: fixed in gpac 1.0.1+dfsg1-2
has caused the Debian Bug report #972053,
regarding CVE-2019-20161 CVE-2019-20162 CVE-2019-20163 CVE-2019-20165 
CVE-2019-20170 CVE-2019-20208 CVE-2019-20628 CVE-2019-20629 CVE-2019-20630 
CVE-2019-20631 CVE-2019-20632 CVE-2020-11558 CVE-2020-6630 CVE-2020-6631
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
972053: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=972053
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: gpac
Version: 0.5.2-426-gc5ad4e4+dfsg5-5
Severity: grave
Tags: security
X-Debbugs-Cc: Debian Security Team <t...@security.debian.org>

CVE-2019-20161:
https://github.com/gpac/gpac/issues/1320
https://github.com/gpac/gpac/commit/7a09732d4978586e6284e84caa9c301b2fa5e956

CVE-2019-20162:
https://github.com/gpac/gpac/issues/1327
https://github.com/gpac/gpac/commit/3c0ba42546c8148c51169c3908e845c308746c77

CVE-2019-20163:
https://github.com/gpac/gpac/issues/1335
https://github.com/gpac/gpac/commit/5250afecbc770c8f26829e9566d5b226a3c5fa80 
(chunk #4)

CVE-2019-20165:
https://github.com/gpac/gpac/issues/1338
https://github.com/gpac/gpac/commit/5250afecbc770c8f26829e9566d5b226a3c5fa80 
(chunk #1)

CVE-2019-20170:
https://github.com/gpac/gpac/issues/1328
https://github.com/gpac/gpac/commit/16856430287cc10f495eb241910b4dc45b193e03

CVE-2019-20171:
https://github.com/gpac/gpac/issues/1337
https://github.com/gpac/gpac/commit/72cdc5048dead86bb1df7d21e0b9975e49cf2d97
https://github.com/gpac/gpac/commit/2bcca3f1d4605100bb27d3ed7be25b53cddbc75c

CVE-2019-20208:
https://github.com/gpac/gpac/issues/1348
https://github.com/gpac/gpac/commit/bcfcb3e90476692fe0d2bb532ea8deeb2a77580e 
(chunk #1)

CVE-2019-20628:
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
https://github.com/gpac/gpac/commit/98b727637e32d1d4824101d8947e2dbd573d4fc8
https://github.com/gpac/gpac/issues/1269

CVE-2019-20629:
https://github.com/gpac/gpac/commit/2320eb73afba753b39b7147be91f7be7afc0eeb7
https://github.com/gpac/gpac/issues/1264

CVE-2019-20630:
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
https://github.com/gpac/gpac/issues/1268

CVE-2019-20631:
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
https://github.com/gpac/gpac/issues/1270

CVE-2019-20632:
https://github.com/gpac/gpac/commit/1ab4860609f2e7a35634930571e7d0531297e090
https://github.com/gpac/gpac/issues/1271

CVE-2020-11558:
https://github.com/gpac/gpac/commit/6063b1a011c3f80cee25daade18154e15e4c058c
https://github.com/gpac/gpac/issues/1440

CVE-2020-6630:
https://github.com/gpac/gpac/issues/1377
https://github.com/gpac/gpac/commit/c7e46e948ebe2d4a532539c7e714cdf655b84521

CVE-2020-6631:
https://github.com/gpac/gpac/issues/1378
https://github.com/gpac/gpac/commit/c7e46e948ebe2d4a532539c7e714cdf655b84521
  
While individual commits refs are listed above, this should really be fixed
via a new upstream release for bullseye, after all the current base version
is from 2015

--- End Message ---
--- Begin Message ---
Source: gpac
Source-Version: 1.0.1+dfsg1-2
Done: Reinhard Tartler <siret...@tauware.de>

We believe that the bug you reported is fixed in the latest version of
gpac, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 972...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Reinhard Tartler <siret...@tauware.de> (supplier of updated gpac package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 21 Nov 2020 17:13:44 -0500
Source: gpac
Architecture: source
Version: 1.0.1+dfsg1-2
Distribution: unstable
Urgency: medium
Maintainer: Debian Multimedia Maintainers <debian-multime...@lists.debian.org>
Changed-By: Reinhard Tartler <siret...@tauware.de>
Closes: 782093 931088 932242 940882 972053
Changes:
 gpac (1.0.1+dfsg1-2) unstable; urgency=medium
 .
   * Upload to unstable
 .
 gpac (1.0.1+dfsg1-1) experimental; urgency=medium
 .
   * New upstream version
     - soname bump to libgpac10
     - Fixes lots of security issues, closes: #972053
        CVE-2019-20161 CVE-2019-20162 CVE-2019-20163 CVE-2019-20165
        CVE-2019-20170 CVE-2019-20208 CVE-2019-20628 CVE-2019-20629
        CVE-2019-20630 CVE-2019-20631 CVE-2019-20632 CVE-2020-11558
        CVE-2020-6630 CVE-2020-6631
     - Fixes CVE-2018-21015 CVE-2018-21016, closes: #940882
     - Fixes CVE-2019-13618, closes: #932242
     - Fixes CVE-2019-12481 CVE-2019-12482 CVE-2019-12483, closes: #931088
     - Fix in manpage, closes: #782093
   * Rewritten debian/copyright with help of 'cme update dpkg-copyright'
Checksums-Sha1:
 c5da7d266afdd05271119b416badf34abb2e5bea 2701 gpac_1.0.1+dfsg1-2.dsc
 2f67a74f0450d84820254d0554ad597dac4c8920 35888 gpac_1.0.1+dfsg1-2.debian.tar.xz
Checksums-Sha256:
 6e303a19bfb9209341426b8b5b163e4836b821dc3d1f99a96bcfc601e0c65178 2701 
gpac_1.0.1+dfsg1-2.dsc
 6c52b8551b27b3cec3685699b2076d903340d41606c601210bde7678e4e958f6 35888 
gpac_1.0.1+dfsg1-2.debian.tar.xz
Files:
 d39a8904daa918ce3f831e88deffd307 2701 graphics optional gpac_1.0.1+dfsg1-2.dsc
 5a8b6049222a28932c52b19780953d2e 35888 graphics optional 
gpac_1.0.1+dfsg1-2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=1yAo
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to