Sylvain Beucler pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
ced84a52 by Sylvain Beucler at 2023-03-04T13:01:39+01:00
CVE-2020-36401/mruby: precise buster triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -126020,11 +126020,12 @@ CVE-2020-36402 (Solidity 0.7.5 has a
stack-use-after-return issue in smtutil::CH
NOT-FOR-US: Solidity
CVE-2020-36401 (mruby 2.1.2 has a double free in mrb_default_allocf (called
from mrb_f ...)
- mruby 2.1.2-3 (bug #990540)
- [buster] - mruby <no-dsa> (Minor issue)
+ [buster] - mruby <not-affected> (Vulnerable code not present)
[stretch] - mruby <not-affected> (Vulnerable code not present)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23801
NOTE:
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/mruby/OSV-2020-744.yaml
NOTE:
https://github.com/mruby/mruby/commit/97319697c8f9f6ff27b32589947e1918e3015503
+ NOTE: Introduced by:
https://github.com/mruby/mruby/commit/9cdf439db52b66447b4e37c61179d54fad6c8f33
(2.1.2-rc)
CVE-2020-36400 (ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in
zmq::tcp_read, ...)
- zeromq3 <not-affected> (Never affected a released version)
NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26042
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ced84a523558c055b295047301f0d25f5305c4b2
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ced84a523558c055b295047301f0d25f5305c4b2
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits