[Git][security-tracker-team/security-tracker][master] CVE-2021-43519: Mark lua5.{1,2,3} as not-affected.
Guilhem Moulin (@guilhem)
guilhem at debian.org
Tue Jun 27 11:25:17 BST 2023
Guilhem Moulin pushed to branch master at Debian Security Tracker / security-tracker
Commits:
3b6a9341 by Guilhem Moulin at 2023-06-27T12:09:08+02:00
CVE-2021-43519: Mark lua5.{1,2,3} as not-affected.
And add introduced commit. Per https://bugs.debian.org/1034847#12 .
and http://lua-users.org/lists/lua-l/2023-06/msg00059.html &
http://lua-users.org/lists/lua-l/2023-06/msg00063.html .
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -123047,27 +123047,16 @@ CVE-2021-43520
CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 a ...)
- lua5.4 5.4.4-1 (bug #1000228)
[bullseye] - lua5.4 <no-dsa> (Minor issue)
- - lua5.3 <unfixed> (bug #1034847)
- [bookworm] - lua5.3 <ignored> (Minor issue)
- [bullseye] - lua5.3 <ignored> (Minor issue)
- [buster] - lua5.3 <no-dsa> (Minor issue)
- [stretch] - lua5.3 <no-dsa> (Minor issue)
- - lua5.2 <unfixed> (bug #1034846)
- [bookworm] - lua5.2 <ignored> (Minor issue)
- [bullseye] - lua5.2 <ignored> (Minor issue)
- [buster] - lua5.2 <no-dsa> (Minor issue)
- [stretch] - lua5.2 <no-dsa> (Minor issue)
- - lua5.1 <unfixed> (bug #1034845)
- [bookworm] - lua5.1 <ignored> (Minor issue)
- [bullseye] - lua5.1 <ignored> (Minor issue)
- [buster] - lua5.1 <no-dsa> (Minor issue)
- [stretch] - lua5.1 <no-dsa> (Minor issue)
+ - lua5.3 <not-affected> (Vulnerable code not present)
+ - lua5.2 <not-affected> (Vulnerable code not present)
+ - lua5.1 <not-affected> (Vulnerable code not present)
- lua50 <not-affected> (Vulnerable code not present)
NOTE: http://lua-users.org/lists/lua-l/2021-10/msg00123.html
NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00015.html
+ NOTE: Introduced by: https://github.com/lua/lua/commit/287b302acb8d925178e9edb800f0a8d18c7d35f6 (v5.4.2)
NOTE: Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868 (v5.4.4)
- NOTE: Likely introduced by https://github.com/lua/lua/commit/287b302acb8d925178e9edb800f0a8d18c7d35f6
NOTE: Cf. http://lua-users.org/lists/lua-l/2023-06/msg00059.html
+ NOTE: Cf. http://lua-users.org/lists/lua-l/2023-06/msg00063.html
CVE-2021-43518 (Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. ...)
- teeworlds 0.7.5-2 (bug #1009070)
[bullseye] - teeworlds <no-dsa> (Minor issue)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3b6a9341919d1f144ab8a7e0a4caf8f3f86ac170
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3b6a9341919d1f144ab8a7e0a4caf8f3f86ac170
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230627/d0e58981/attachment.htm>
More information about the debian-security-tracker-commits
mailing list