[Git][security-tracker-team/security-tracker][master] 2 commits: CVE-2019-6706/lua5.3: reference patch
    Sylvain Beucler (@beuc) 
    beuc at debian.org
       
    Wed Jun 21 18:49:11 BST 2023
    
    
  
Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker
Commits:
96bdf598 by Sylvain Beucler at 2023-06-21T19:47:41+02:00
CVE-2019-6706/lua5.3: reference patch
- - - - -
76a736e5 by Sylvain Beucler at 2023-06-21T19:48:40+02:00
CVE-2019-6706/lua5.3: refresh buster triage
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -305293,14 +305293,14 @@ CVE-2019-6707 (PHPSHE 1.7 has SQL injection via the admin.php?mod=product&act=st
 CVE-2019-6706 (Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For examp ...)
 	- lua5.3 5.3.6-1 (bug #920321)
 	[bullseye] - lua5.3 <postponed> (Minor issue, revisit when fixed upstream)
-	[buster] - lua5.3 <postponed> (Minor issue, revisit when fixed upstream)
-	[stretch] - lua5.3 <postponed> (Minor issue, revisit when fixed upstream)
+	[buster] - lua5.3 <postponed> (Minor issue)
 	- lua5.2 <not-affected> (Vulnerable code introduced later)
 	- lua5.1 <not-affected> (Vulnerable code introduced later)
 	- lua50 <not-affected> (Vulnerable code introduced later)
 	NOTE: http://lua.2524044.n2.nabble.com/Bug-Report-Use-after-free-in-debug-upvaluejoin-tc7685506.html
 	NOTE: lua50 and lua5.1 don't have the affected code.
 	NOTE: lua5.2 is not vulnerable as it doesn't free the value before using it.
+	NOTE: https://github.com/lua/lua/commit/89aee84cbc9224f638f3b7951b306d2ee8ecb71e (v5.3.6)
 CVE-2019-6705
 	RESERVED
 CVE-2019-6704
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ae5b29e98d9004ec832e0379356e296ff0291439...76a736e5e4d467b2b1d13a76d883f15ecb442a2c
-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/ae5b29e98d9004ec832e0379356e296ff0291439...76a736e5e4d467b2b1d13a76d883f15ecb442a2c
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230621/0f8db532/attachment.htm>
    
    
More information about the debian-security-tracker-commits
mailing list