[Git][security-tracker-team/security-tracker][master] 2 commits: CVE-2019-6706/lua5.3: Point to post on lua-users list.
Guilhem Moulin (@guilhem)
guilhem at debian.org
Thu Jun 22 12:41:14 BST 2023
Guilhem Moulin pushed to branch master at Debian Security Tracker / security-tracker
Commits:
bae92072 by Guilhem Moulin at 2023-06-22T13:40:46+02:00
CVE-2019-6706/lua5.3: Point to post on lua-users list.
Nabble has been deprecated.
- - - - -
32dcaa6f by Guilhem Moulin at 2023-06-22T13:40:48+02:00
CVE-2021-43519/lua5.3: Add tag ref for upstream fix 74d99057.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -122470,7 +122470,7 @@ CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5
- lua50 <not-affected> (Vulnerable code not present)
NOTE: http://lua-users.org/lists/lua-l/2021-10/msg00123.html
NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00015.html
- NOTE: Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868
+ NOTE: Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868 (v5.4.4)
CVE-2021-43518 (Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. ...)
- teeworlds 0.7.5-2 (bug #1009070)
[bullseye] - teeworlds <no-dsa> (Minor issue)
@@ -305367,7 +305367,7 @@ CVE-2019-6706 (Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For
- lua5.2 <not-affected> (Vulnerable code introduced later)
- lua5.1 <not-affected> (Vulnerable code introduced later)
- lua50 <not-affected> (Vulnerable code introduced later)
- NOTE: http://lua.2524044.n2.nabble.com/Bug-Report-Use-after-free-in-debug-upvaluejoin-tc7685506.html
+ NOTE: http://lua-users.org/lists/lua-l/2019-01/msg00039.html
NOTE: lua50 and lua5.1 don't have the affected code.
NOTE: lua5.2 is not vulnerable as it doesn't free the value before using it.
NOTE: https://github.com/lua/lua/commit/89aee84cbc9224f638f3b7951b306d2ee8ecb71e (v5.3.6)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/73c8cf3ce3a1e90520077f052e2e3e13ecec5135...32dcaa6f6f97e62e4d50f9dabf17859f532a874a
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/73c8cf3ce3a1e90520077f052e2e3e13ecec5135...32dcaa6f6f97e62e4d50f9dabf17859f532a874a
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230622/c4c67433/attachment.htm>
More information about the debian-security-tracker-commits
mailing list