Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
b2986d36 by Salvatore Bonaccorso at 2022-02-07T13:54:43+01:00
Track fixed version for lua5.4 issues via unstable

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -12409,7 +12409,7 @@ CVE-2021-44648 (GNOME gdk-pixbuf 2.42.6 is vulnerable 
to a heap-buffer overflow
        NOTE: 
https://sahildhar.github.io/blogpost/GdkPixbuf-Heap-Buffer-Overflow-in-lzw_decoder_new/
        NOTE: Introduced by: 
https://gitlab.gnome.org/GNOME/gdk-pixbuf/-/commit/b88f1ce91a610a4e491a4ad6352183791e78afac
 (2.39.2)
 CVE-2021-44647 (Lua 5.4.4 and 5.4.2 are affected by SEGV by type confusion in 
funcname ...)
-       - lua5.4 <unfixed> (bug #1004189)
+       - lua5.4 5.4.4-1 (bug #1004189)
        NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00195.html
        NOTE: http://lua-users.org/lists/lua-l/2021-11/msg00204.html
        NOTE: Fixed by: 
https://github.com/lua/lua/commit/1de95e97ef65632a88e08b6184bd9d1ceba7ec2f
@@ -16836,7 +16836,7 @@ CVE-2021-43521
 CVE-2021-43520
        RESERVED
 CVE-2021-43519 (Stack overflow in lua_resume of ldo.c in Lua Interpreter 
5.1.0~5.4.4 a ...)
-       - lua5.4 <unfixed> (bug #1000228)
+       - lua5.4 5.4.4-1 (bug #1000228)
        [bullseye] - lua5.4 <no-dsa> (Minor issue)
        - lua5.3 <unfixed>
        [bullseye] - lua5.3 <no-dsa> (Minor issue)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b2986d361723ac6821e580341cd82428b3933a5d

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/b2986d361723ac6821e580341cd82428b3933a5d
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to