Your message dated Sat, 13 Aug 2022 18:03:40 +0000
with message-id <[email protected]>
and subject line Bug#1016666: Removed package(s) from unstable
has caused the Debian Bug report #1004298,
regarding iotjs: CVE-2022-22888 CVE-2022-22890 CVE-2022-22891 CVE-2022-22892 
CVE-2022-22893 CVE-2022-22894 CVE-2022-22895
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1004298: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1004298
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: iotjs
Version: 1.0+715-1
Severity: important
Tags: security
X-Debbugs-Cc: [email protected], Debian Security Team 
<[email protected]>

Hi,

The following vulnerabilities were published for iotjs.

CVE-2022-22895[0]:
| Jerryscript 3.0.0 was discovered to contain a heap-buffer-overflow via
| ecma_utf8_string_to_number_by_radix in /jerry-core/ecma/base/ecma-
| helpers-conversion.c.


CVE-2022-22894[1]:
| Jerryscript 3.0.0 was discovered to contain a stack overflow via
| ecma_lcache_lookup in /jerry-core/ecma/base/ecma-lcache.c.


CVE-2022-22893[2]:
| Jerryscript 3.0.0 was discovered to contain a stack overflow via
| vm_loop.lto_priv.304 in /jerry-core/vm/vm.c.


CVE-2022-22892[3]:
| There is an Assertion 'ecma_is_value_undefined (value) ||
| ecma_is_value_null (value) || ecma_is_value_boolean (value) ||
| ecma_is_value_number (value) || ecma_is_value_string (value) ||
| ecma_is_value_bigint (value) || ecma_is_value_symbol (value) ||
| ecma_is_value_object (value)' failed at jerry-core/ecma/base/ecma-
| helpers-value.c in Jerryscripts 3.0.0.


CVE-2022-22891[4]:
| Jerryscript 3.0.0 was discovered to contain a SEGV vulnerability via
| ecma_ref_object_inline in /jerry-core/ecma/base/ecma-gc.c.


CVE-2022-22890[5]:
| There is an Assertion 'arguments_type != SCANNER_ARGUMENTS_PRESENT
| &amp;&amp; arguments_type != SCANNER_ARGUMENTS_PRESENT_NO_REG' failed
| at /jerry-core/parser/js/js-scanner-util.c in Jerryscript 3.0.0.


CVE-2022-22888[6]:
| Jerryscript 3.0.0 was discovered to contain a stack overflow via
| ecma_op_object_find_own in /ecma/operations/ecma-objects.c.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-22895
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22895
[1] https://security-tracker.debian.org/tracker/CVE-2022-22894
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22894
[2] https://security-tracker.debian.org/tracker/CVE-2022-22893
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22893
[3] https://security-tracker.debian.org/tracker/CVE-2022-22892
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22892
[4] https://security-tracker.debian.org/tracker/CVE-2022-22891
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22891
[5] https://security-tracker.debian.org/tracker/CVE-2022-22890
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22890
[6] https://security-tracker.debian.org/tracker/CVE-2022-22888
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22888

Please adjust the affected versions in the BTS as needed.



-- System Information:
Debian Release: bookworm/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 5.15.0-2-amd64 (SMP w/16 CPU threads)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

--- End Message ---
--- Begin Message ---
Version: 1.0+715-1+rm

Dear submitter,

as the package iotjs has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/1016666

The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
[email protected].

Debian distribution maintenance software
pp.
Thorsten Alteholz (the ftpmaster behind the curtain)

--- End Message ---
-- 
Pkg-javascript-devel mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel

Reply via email to