diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2020-01-27 23:03:31 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2020-01-27 23:03:31 +0100 |
commit | 4399b6909106175da63918238163533eb5d755a5 (patch) | |
tree | c332b3fac6a4d752f4587b43e3b86b6819ae1455 /data | |
parent | f67db082cc5849d942f4fd93808f6174c52035a8 (diff) |
Update information on CVE-2020-6838/mruby
Diffstat (limited to 'data')
-rw-r--r-- | data/CVE/list | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/data/CVE/list b/data/CVE/list index 032e6a1670..df8aee3a9a 100644 --- a/data/CVE/list +++ b/data/CVE/list @@ -2705,14 +2705,12 @@ CVE-2020-6839 (In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str NOTE: Introduced by: https://github.com/mruby/mruby/commit/2532e625edc2457447369e36e2ecf7882d872ef9 NOTE: Fixed by: https://github.com/mruby/mruby/commit/2124b9b4c95e66e63b1eb26a8dab49753b82fd6c CVE-2020-6838 (In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems ...) - - mruby <unfixed> - [jessie] - mruby <not-affected> (Vulnerable introduced later) + - mruby <not-affected> (Vulnerable code not present) + NOTE: Introduced by: https://github.com/mruby/mruby/commit/694089fafe4eae36c379a3d918d540eb0c4b8661 NOTE: https://github.com/mruby/mruby/issues/4926 NOTE: https://github.com/mruby/mruby/commit/fc8fb41451b07b3fda0726ba80e88e509ad02452 - NOTE: This commit is the same as mentioned in CVE-2020-6840. NOTE: https://github.com/mruby/mruby/commit/70e574689664c10ed2c47581999cc2ce3e3c5afb NOTE: https://github.com/mruby/mruby/commit/2742ded32fe18f88833d76b297f5c2170b6880c3 - TODO: check CVE-2020-6837 RESERVED CVE-2020-6836 (grammar-parser.jison in the hot-formula-parser package before 3.0.1 fo ...) |