[Git][security-tracker-team/security-tracker][master] lua5.4 fixed in sid
Moritz Muehlenhoff
jmm at debian.org
Sat Nov 21 16:49:35 GMT 2020
Moritz Muehlenhoff pushed to branch master at Debian Security Tracker / security-tracker
Commits:
acf2ae4f by Moritz Muehlenhoff at 2020-11-21T17:49:22+01:00
lua5.4 fixed in sid
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -13464,20 +13464,20 @@ CVE-2020-24372 (LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_r
NOTE: https://github.com/LuaJIT/LuaJIT/issues/603
NOTE: No security impact, only "exploitable" with untrusted Lua code
CVE-2020-24371 (lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the ...)
- - lua5.4 <unfixed> (bug #971010)
+ - lua5.4 5.4.1-1 (bug #971010)
- lua5.3 <not-affected> (Vulnerable code introduced in 5.4.0)
NOTE: https://github.com/lua/lua/commit/a6da1472c0c5e05ff249325f979531ad51533110
NOTE: https://www.lua.org/bugs.html#5.4.0-10
CVE-2020-24370 (ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation faul ...)
{DLA-2381-1}
- - lua5.4 <unfixed> (bug #971613)
+ - lua5.4 5.4.1-1 (bug #971613)
- lua5.3 <unfixed>
[buster] - lua5.3 <no-dsa> (Minor issue)
NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00324.html
NOTE: (lua5.4) https://github.com/lua/lua/commit/a585eae6e7ada1ca9271607a4f48dfb17868ab7b
NOTE: (lua5.3) https://github.com/lua/lua/commit/b5bc89846721375fe30772eb8c5ab2786f362bf9
CVE-2020-24369 (ldebug.c in Lua 5.4.0 attempts to access debug information via the lin ...)
- - lua5.4 <unfixed> (bug #971013)
+ - lua5.4 5.4.1-1 (bug #971013)
NOTE: https://github.com/lua/lua/commit/ae5b5ba529753c7a653901ffc29b5ea24c3fdf3a
NOTE: https://www.lua.org/bugs.html#5.4.0-12
CVE-2020-24368 (Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Director ...)
@@ -13546,7 +13546,7 @@ CVE-2020-24344 (JerryScript through 2.3.0 has a (function({a=arguments}){const a
CVE-2020-24343 (Artifex MuJS through 1.0.7 has a use-after-free in jsrun.c because of ...)
NOT-FOR-US: MuJS
CVE-2020-24342 (Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring be ...)
- - lua5.4 <unfixed> (bug #971012)
+ - lua5.4 5.4.1-1 (bug #971012)
NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00052.html
NOTE: https://github.com/lua/lua/commit/34affe7a63fc5d842580a9f23616d057e17dfe27
CVE-2020-24341
@@ -30855,7 +30855,7 @@ CVE-2020-15889 (Lua through 5.4.0 has a getobjname heap-based buffer over-read b
NOTE: https://github.com/lua/lua/commit/127e7a6c8942b362aa3c6627f44d660a4fb75312
NOTE: Introduced in 5.4
CVE-2020-15888 (Lua through 5.4.0 mishandles the interaction between stack resizes and ...)
- - lua5.4 <unfixed> (bug #972101)
+ - lua5.4 5.4.1-1 (bug #972101)
NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00053.html
NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00054.html
NOTE: http://lua-users.org/lists/lua-l/2020-07/msg00071.html
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acf2ae4f457009d5df943d5fac07b513f6401b04
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/acf2ae4f457009d5df943d5fac07b513f6401b04
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20201121/904f6518/attachment.html>
More information about the debian-security-tracker-commits
mailing list