summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorSalvatore Bonaccorso <carnil@debian.org>2020-01-27 23:03:31 +0100
committerSalvatore Bonaccorso <carnil@debian.org>2020-01-27 23:03:31 +0100
commitef33a39ed2b27a4cf0a6dac83f152d7312beb146 (patch)
treea34b0d64e17623cf57c8169a54b9441f0476eb3d
parentb271435c1eeba8aa40254a551be1f7d9f77fd0bb (diff)
Update information on CVE-2020-6838/mruby
-rw-r--r--data/CVE/2020.list6
1 files changed, 2 insertions, 4 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list
index 37155b2490..e5c6f2a626 100644
--- a/data/CVE/2020.list
+++ b/data/CVE/2020.list
@@ -2557,14 +2557,12 @@ CVE-2020-6839 (In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str
NOTE: Introduced by: https://github.com/mruby/mruby/commit/2532e625edc2457447369e36e2ecf7882d872ef9
NOTE: Fixed by: https://github.com/mruby/mruby/commit/2124b9b4c95e66e63b1eb26a8dab49753b82fd6c
CVE-2020-6838 (In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems ...)
- - mruby <unfixed>
- [jessie] - mruby <not-affected> (Vulnerable introduced later)
+ - mruby <not-affected> (Vulnerable code not present)
+ NOTE: Introduced by: https://github.com/mruby/mruby/commit/694089fafe4eae36c379a3d918d540eb0c4b8661
NOTE: https://github.com/mruby/mruby/issues/4926
NOTE: https://github.com/mruby/mruby/commit/fc8fb41451b07b3fda0726ba80e88e509ad02452
- NOTE: This commit is the same as mentioned in CVE-2020-6840.
NOTE: https://github.com/mruby/mruby/commit/70e574689664c10ed2c47581999cc2ce3e3c5afb
NOTE: https://github.com/mruby/mruby/commit/2742ded32fe18f88833d76b297f5c2170b6880c3
- TODO: check
CVE-2020-6837
RESERVED
CVE-2020-6836 (grammar-parser.jison in the hot-formula-parser package before 3.0.1 fo ...)

© 2014-2024 Faster IT GmbH | imprint | privacy policy