I am new to this list and would like to get involved, but I am a relative
beginner in programming.   I understand from looking at this CVE that it is
triggered by a particular type of API call, which is probably unlikely in
the wild, unless prior recon has been done and there is already a threat
actor inside.  The threat is less than six.  I work in security and I have
seen many environments where threats this low are not patched.  If I would
have time and would want to volunteer help, can someone instruct me how to
get started?  Thank you in advance. I apologize if I am making noise on the
list, I just signed up.  I thought QA would be an easy way to get started
in the Debian community.  Thanks.

Michael Lazin

.. τὸ γὰρ αὐτὸ νοεῖν ἐστίν τε καὶ εἶναι.


On Mon, Aug 23, 2021 at 8:03 AM Adrian Bunk <b...@debian.org> wrote:

> Source: passenger
> Severity: serious
>
> passenger-5.0.30/src/cxx_supportlib/vendor-copy:
> adhoc_lve.h  libcurl  libuv  nghttp2  utf8  utf8.h
>
> passenger-5.0.30/src/cxx_supportlib/vendor-modified:
> SmallVector.h  jsoncpp  modp_b64.cpp  modp_b64_data.h
> boost          libev    modp_b64.h    psg_sysqueue.h
>
> passenger-6.0.10/src/cxx_supportlib/vendor-copy:
> adhoc_lve.h  libuv  utf8  utf8.h  websocketpp
>
> passenger-6.0.10/src/cxx_supportlib/vendor-modified:
> boost    libev         modp_b64.h       modp_b64_strict_aliasing.cpp
> jsoncpp  modp_b64.cpp  modp_b64_data.h  psg_sysqueue.h
>
>
> The problem is that these vendored copies seem to actually be used.
>
> Does for example CVE-2021-22918 in libuv1 need fixing in passenger?
>
> The security team is Cc'ed, and in a better position to suggest
> how this package should be handled.
>
> Related, passenger is in security-tracker/data/packages/removed-packages
> (it was renamed to ruby-passenger and then renamed back).
>
>

Reply via email to