Your message dated Sat, 13 Aug 2022 18:03:40 +0000
with message-id <[email protected]>
and subject line Bug#1016666: Removed package(s) from unstable
has caused the Debian Bug report #1015219,
regarding iotjs: CVE-2021-41682 CVE-2021-41683 CVE-2021-41751 CVE-2021-41959 
CVE-2021-42863 CVE-2021-43453 CVE-2021-46170
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1015219: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015219
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: iotjs
X-Debbugs-CC: [email protected]
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for iotjs.

CVE-2021-41682[0]:
| There is a heap-use-after-free at ecma-helpers-string.c:1940 in
| ecma_compare_ecma_non_direct_strings in JerryScript 2.4.0

https://github.com/jerryscript-project/jerryscript/issues/4747
https://github.com/jerryscript-project/jerryscript/commit/3ad76f932c8d2e3b9ba2d95e64848698ec7d7290

CVE-2021-41683[1]:
| There is a stack-overflow at ecma-helpers.c:326 in
| ecma_get_lex_env_type in JerryScript 2.4.0

https://github.com/jerryscript-project/jerryscript/issues/4745

CVE-2021-41751[2]:
| Buffer overflow vulnerability in file ecma-builtin-array-
| prototype.c:909 in function ecma_builtin_array_prototype_object_slice
| in Jerryscript before commit e1ce7dd7271288be8c0c8136eea9107df73a8ce2
| on Oct 20, 2021.

https://github.com/jerryscript-project/jerryscript/pull/4797
https://github.com/jerryscript-project/jerryscript/commit/4912e3b739f4d00e51a46d883b020d2208be28a2

CVE-2021-41959[3]:
| JerryScript Git version 14ff5bf does not sufficiently track and
| release allocated memory via jerry-core/ecma/operations/ecma-regexp-
| object.c after RegExp, which causes a memory leak.

https://github.com/jerryscript-project/jerryscript/issues/4781
https://github.com/jerryscript-project/jerryscript/pull/4166
https://github.com/jerryscript-project/jerryscript/pull/4787

CVE-2021-42863[4]:
| A buffer overflow in ecma_builtin_typedarray_prototype_filter() in
| JerryScript version fe3a5c0 allows an attacker to construct a fake
| object or a fake arraybuffer with unlimited size.

https://github.com/jerryscript-project/jerryscript/issues/4793
https://github.com/jerryscript-project/jerryscript/pull/4794
https://github.com/jerryscript-project/jerryscript/commit/4e8d6344a8b5cf8f00bd3d5e869147af06d0189e

CVE-2021-43453[5]:
| A Heap-based Buffer Overflow vulnerability exists in JerryScript 2.4.0
| and prior versions via an out-of-bounds read in
| parser_parse_for_statement_start in the js-parser-statm.c file. This
| issue is similar to CVE-2020-29657.

https://github.com/jerryscript-project/jerryscript/pull/4808
https://github.com/jerryscript-project/jerryscript/issues/4754
Fixed by; 
https://github.com/jerryscript-project/jerryscript/commit/efe63a5bbc5106164a08ee2eb415a7a701f5311f

CVE-2021-46170[6]:
| An issue was discovered in JerryScript commit a6ab5e9. There is an
| Use-After-Free in lexer_compare_identifier_to_string in js-lexer.c
| file.

https://github.com/jerryscript-project/jerryscript/issues/4917
https://github.com/jerryscript-project/jerryscript/pull/4942/commits/5e1fdd1d1e75105b43392b4bb3996099cdc50f3d
        
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-41682
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41682
[1] https://security-tracker.debian.org/tracker/CVE-2021-41683
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41683
[2] https://security-tracker.debian.org/tracker/CVE-2021-41751
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41751
[3] https://security-tracker.debian.org/tracker/CVE-2021-41959
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41959
[4] https://security-tracker.debian.org/tracker/CVE-2021-42863
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42863
[5] https://security-tracker.debian.org/tracker/CVE-2021-43453
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43453
[6] https://security-tracker.debian.org/tracker/CVE-2021-46170
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46170

Please adjust the affected versions in the BTS as needed.

--- End Message ---
--- Begin Message ---
Version: 1.0+715-1+rm

Dear submitter,

as the package iotjs has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/1016666

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
[email protected].

Debian distribution maintenance software
pp.
Thorsten Alteholz (the ftpmaster behind the curtain)

--- End Message ---
-- 
Pkg-javascript-devel mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel

Reply via email to