diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2021-12-04 10:41:46 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2021-12-04 10:41:46 +0100 |
commit | ee520d64dac1e7b13b8eadcb5073772a826a8305 (patch) | |
tree | 5c6780c305c649546920c373b5925db85a1227a2 /data | |
parent | 2ddf1b3198a3f04cb30ada673459e5e0df93d6e9 (diff) |
Update tracking for CVE-2020-36133/aom
In apps/aoemenc.c the missing checks seems to be missing back as well in
the aomenc from buster.
Request for reviewers: please double check again this update as well.
Diffstat (limited to 'data')
-rw-r--r-- | data/CVE/2020.list | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list index 22f87f77f1..2ec90139d4 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -1074,10 +1074,10 @@ CVE-2020-36134 (AOM v2.0.1 was discovered to contain a segmentation violation vi NOTE: https://aomedia.googlesource.com/aom/+/5a1b33b710050b69557d26cf53d4943325481beb (v2.0.1) CVE-2020-36133 (AOM v2.0.1 was discovered to contain a global buffer overflow via the ...) - aom 3.2.0-1 - [bullseye] - aom <not-affected> (Vulnerable code introduced later) - [buster] - aom <not-affected> (Vulnerable code introduced later) + [bullseye] - aom <no-dsa> (Minor issue) + [buster] - aom <no-dsa> (Minor issue) NOTE: https://bugs.chromium.org/p/aomedia/issues/detail?id=2913&q=&can=1 - NOTE: https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.0.0) + NOTE: https://aomedia.googlesource.com/aom/+/5c9bc4181071684d157fc47c736acf6c69a85d85 (v3.2.0-rc1) CVE-2020-36132 RESERVED CVE-2020-36131 (AOM v2.0.1 was discovered to contain a stack buffer overflow via the c ...) |