[Git][security-tracker-team/security-tracker][master] lua5.4 fixed in sid

Moritz Muehlenhoff jmm at debian.org
Sat Nov 21 16:49:35 GMT 2020



Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker


Commits:
acf2ae4f by Moritz Muehlenhoff at 2020-11-21T17:49:22+01:00
lua5.4 fixed in sid

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -13464,20 +13464,20 @@ CVE-2020-24372 (LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_r
 	NOTE: https://github.com/LuaJIT/LuaJIT/issues/603
 	NOTE: No security impact, only "exploitable" with untrusted Lua code
 CVE-2020-24371 (lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the ...)
-	- lua5.4 <unfixed> (bug #971010)
+	- lua5.4 5.4.1-1 (bug #971010)
 	- lua5.3 <not-affected> (Vulnerable code introduced in 5.4.0)
 	NOTE: https://github.com/lua/lua/commit/a6da1472c0c5e05ff249325f979531ad51533110
 	NOTE: https://www.lua.org/bugs.html#5.4.0-10
 CVE-2020-24370 (ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation faul ...)
 	{DLA-2381-1}
-	- lua5.4 <unfixed> (bug #971613)
+	- lua5.4 5.4.1-1 (bug #971613)
 	- lua5.3 <unfixed>
 	[buster] - lua5.3 <no-dsa> (Minor issue)
 	NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00324.html
 	NOTE: (lua5.4) https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b
 	NOTE: (lua5.3) https://github.com/lua/lua/commit/b5bc89846721375fe30772eb8c5ab2786f362bf9
 CVE-2020-24369 (ldebug.c in Lua 5.4.0 attempts to access debug information via the lin ...)
-	- lua5.4 <unfixed> (bug #971013)
+	- lua5.4 5.4.1-1 (bug #971013)
 	NOTE: https://github.com/lua/lua/commit/ae5b5ba529753c7a653901ffc29b5ea24c3fdf3a
 	NOTE: https://www.lua.org/bugs.html#5.4.0-12
 CVE-2020-24368 (Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Director ...)
@@ -13546,7 +13546,7 @@ CVE-2020-24344 (JerryScript through 2.3.0 has a (function({a=arguments}){const a
 CVE-2020-24343 (Artifex MuJS through 1.0.7 has a use-after-free in jsrun.c because of  ...)
 	NOT-FOR-US: MuJS
 CVE-2020-24342 (Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring be ...)
-	- lua5.4 <unfixed> (bug #971012)
+	- lua5.4 5.4.1-1 (bug #971012)
 	NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00052.html
 	NOTE: https://github.com/lua/lua/commit/34affe7a63fc5d842580a9f23616d057e17dfe27
 CVE-2020-24341
@@ -30855,7 +30855,7 @@ CVE-2020-15889 (Lua through 5.4.0 has a getobjname heap-based buffer over-read b
 	NOTE: https://github.com/lua/lua/commit/127e7a6c8942b362aa3c6627f44d660a4fb75312
 	NOTE: Introduced in 5.4
 CVE-2020-15888 (Lua through 5.4.0 mishandles the interaction between stack resizes and ...)
-	- lua5.4 <unfixed> (bug #972101)
+	- lua5.4 5.4.1-1 (bug #972101)
 	NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00053.html
 	NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00054.html
 	NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00071.html



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acf2ae4f457009d5df943d5fac07b513f6401b04

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acf2ae4f457009d5df943d5fac07b513f6401b04
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201121/904f6518/attachment.html>


More information about the debian-security-tracker-commits mailing list