[Git][security-tracker-team/security-tracker][master] CVE-2021-43519: Mark lua5.{1,2,3} as not-affected.

Guilhem Moulin (@guilhem) guilhem at debian.org
Tue Jun 27 11:25:17 BST 2023



Guilhem Moulin pushed to branch master at Debian Security Tracker / security-tracker


Commits:
3b6a9341 by Guilhem Moulin at 2023-06-27T12:09:08+02:00
CVE-2021-43519: Mark lua5.{1,2,3} as not-affected.

And add introduced commit.  Per https://bugs.debian.org/1034847#12 .
and http://lua-users.org/lists/lua-l/2023-06/msg00059.html &
http://lua-users.org/lists/lua-l/2023-06/msg00063.html .

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -123047,27 +123047,16 @@ CVE-2021-43520
 CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 a ...)
 	- lua5.4 5.4.4-1 (bug #1000228)
 	[bullseye] - lua5.4 <no-dsa> (Minor issue)
-	- lua5.3 <unfixed> (bug #1034847)
-	[bookworm] - lua5.3 <ignored> (Minor issue)
-	[bullseye] - lua5.3 <ignored> (Minor issue)
-	[buster] - lua5.3 <no-dsa> (Minor issue)
-	[stretch] - lua5.3 <no-dsa> (Minor issue)
-	- lua5.2 <unfixed> (bug #1034846)
-	[bookworm] - lua5.2 <ignored> (Minor issue)
-	[bullseye] - lua5.2 <ignored> (Minor issue)
-	[buster] - lua5.2 <no-dsa> (Minor issue)
-	[stretch] - lua5.2 <no-dsa> (Minor issue)
-	- lua5.1 <unfixed> (bug #1034845)
-	[bookworm] - lua5.1 <ignored> (Minor issue)
-	[bullseye] - lua5.1 <ignored> (Minor issue)
-	[buster] - lua5.1 <no-dsa> (Minor issue)
-	[stretch] - lua5.1 <no-dsa> (Minor issue)
+	- lua5.3 <not-affected> (Vulnerable code not present)
+	- lua5.2 <not-affected> (Vulnerable code not present)
+	- lua5.1 <not-affected> (Vulnerable code not present)
 	- lua50 <not-affected> (Vulnerable code not present)
 	NOTE: http://lua-users.org/lists/lua-l/2021-10/msg00123.html
 	NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00015.html
+	NOTE: Introduced by: https://github.com/lua/lua/commit/287b302acb8d925178e9edb800f0a8d18c7d35f6 (v5.4.2)
 	NOTE: Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868 (v5.4.4)
-	NOTE: Likely introduced by https://github.com/lua/lua/commit/287b302acb8d925178e9edb800f0a8d18c7d35f6
 	NOTE: Cf. http://lua-users.org/lists/lua-l/2023-06/msg00059.html
+	NOTE: Cf. http://lua-users.org/lists/lua-l/2023-06/msg00063.html
 CVE-2021-43518 (Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow.  ...)
 	- teeworlds 0.7.5-2 (bug #1009070)
 	[bullseye] - teeworlds <no-dsa> (Minor issue)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3b6a9341919d1f144ab8a7e0a4caf8f3f86ac170

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/3b6a9341919d1f144ab8a7e0a4caf8f3f86ac170
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230627/d0e58981/attachment.htm>


More information about the debian-security-tracker-commits mailing list