diff options
author | Salvatore Bonaccorso <carnil@debian.org> | 2020-01-27 23:03:31 +0100 |
---|---|---|
committer | Salvatore Bonaccorso <carnil@debian.org> | 2020-01-27 23:03:31 +0100 |
commit | ef33a39ed2b27a4cf0a6dac83f152d7312beb146 (patch) | |
tree | a34b0d64e17623cf57c8169a54b9441f0476eb3d | |
parent | b271435c1eeba8aa40254a551be1f7d9f77fd0bb (diff) |
Update information on CVE-2020-6838/mruby
-rw-r--r-- | data/CVE/2020.list | 6 |
1 files changed, 2 insertions, 4 deletions
diff --git a/data/CVE/2020.list b/data/CVE/2020.list index 37155b2490..e5c6f2a626 100644 --- a/data/CVE/2020.list +++ b/data/CVE/2020.list @@ -2557,14 +2557,12 @@ CVE-2020-6839 (In mruby 2.1.0, there is a stack-based buffer overflow in mrb_str NOTE: Introduced by: https://github.com/mruby/mruby/commit/2532e625edc2457447369e36e2ecf7882d872ef9 NOTE: Fixed by: https://github.com/mruby/mruby/commit/2124b9b4c95e66e63b1eb26a8dab49753b82fd6c CVE-2020-6838 (In mruby 2.1.0, there is a use-after-free in hash_values_at in mrbgems ...) - - mruby <unfixed> - [jessie] - mruby <not-affected> (Vulnerable introduced later) + - mruby <not-affected> (Vulnerable code not present) + NOTE: Introduced by: https://github.com/mruby/mruby/commit/694089fafe4eae36c379a3d918d540eb0c4b8661 NOTE: https://github.com/mruby/mruby/issues/4926 NOTE: https://github.com/mruby/mruby/commit/fc8fb41451b07b3fda0726ba80e88e509ad02452 - NOTE: This commit is the same as mentioned in CVE-2020-6840. NOTE: https://github.com/mruby/mruby/commit/70e574689664c10ed2c47581999cc2ce3e3c5afb NOTE: https://github.com/mruby/mruby/commit/2742ded32fe18f88833d76b297f5c2170b6880c3 - TODO: check CVE-2020-6837 RESERVED CVE-2020-6836 (grammar-parser.jison in the hot-formula-parser package before 3.0.1 fo ...) |