Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
ced84a52 by Sylvain Beucler at 2023-03-04T13:01:39+01:00
CVE-2020-36401/mruby: precise buster triage

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -126020,11 +126020,12 @@ CVE-2020-36402 (Solidity 0.7.5 has a 
stack-use-after-return issue in smtutil::CH
        NOT-FOR-US: Solidity
 CVE-2020-36401 (mruby 2.1.2 has a double free in mrb_default_allocf (called 
from mrb_f ...)
        - mruby 2.1.2-3 (bug #990540)
-       [buster] - mruby <no-dsa> (Minor issue)
+       [buster] - mruby <not-affected> (Vulnerable code not present)
        [stretch] - mruby <not-affected> (Vulnerable code not present)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=23801
        NOTE: 
https://github.com/google/oss-fuzz-vulns/blob/main/vulns/mruby/OSV-2020-744.yaml
        NOTE: 
https://github.com/mruby/mruby/commit/97319697c8f9f6ff27b32589947e1918e3015503
+       NOTE: Introduced by: 
https://github.com/mruby/mruby/commit/9cdf439db52b66447b4e37c61179d54fad6c8f33 
(2.1.2-rc)
 CVE-2020-36400 (ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in 
zmq::tcp_read, ...)
        - zeromq3 <not-affected> (Never affected a released version)
        NOTE: https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26042



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ced84a523558c055b295047301f0d25f5305c4b2

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/ced84a523558c055b295047301f0d25f5305c4b2
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to