Name | CVE-2021-43519 |
Description | Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1000228, 1034845, 1034846, 1034847 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
lua5.1 (PTS) | buster, bullseye | 5.1.5-8.1 | vulnerable |
| bookworm, sid | 5.1.5-9 | vulnerable |
lua5.2 (PTS) | buster, bullseye | 5.2.4-1.1 | vulnerable |
| bookworm, sid | 5.2.4-3 | vulnerable |
lua5.3 (PTS) | buster, bullseye | 5.3.3-1.1 | vulnerable |
| bookworm, sid | 5.3.6-2 | vulnerable |
lua5.4 (PTS) | bullseye | 5.4.2-2 | vulnerable |
| bookworm, sid | 5.4.4-3 | fixed |
lua50 (PTS) | buster | 5.0.3-8 | fixed |
| bullseye | 5.0.3-8.1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[bullseye] - lua5.4 <no-dsa> (Minor issue)
[bookworm] - lua5.3 <ignored> (Minor issue)
[bullseye] - lua5.3 <ignored> (Minor issue)
[buster] - lua5.3 <no-dsa> (Minor issue)
[stretch] - lua5.3 <no-dsa> (Minor issue)
[bookworm] - lua5.2 <ignored> (Minor issue)
[bullseye] - lua5.2 <ignored> (Minor issue)
[buster] - lua5.2 <no-dsa> (Minor issue)
[stretch] - lua5.2 <no-dsa> (Minor issue)
[bookworm] - lua5.1 <ignored> (Minor issue)
[bullseye] - lua5.1 <ignored> (Minor issue)
[buster] - lua5.1 <no-dsa> (Minor issue)
[stretch] - lua5.1 <no-dsa> (Minor issue)
- lua50 <not-affected> (Vulnerable code not present)
http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868