CVE-2021-43519

NameCVE-2021-43519
DescriptionStack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1000228

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lua5.1 (PTS)bullseye5.1.5-8.1fixed
bookworm, sid, trixie5.1.5-9fixed
lua5.2 (PTS)bullseye5.2.4-1.1fixed
bookworm, sid, trixie5.2.4-3fixed
lua5.3 (PTS)bullseye5.3.3-1.1+deb11u1fixed
bookworm, sid, trixie5.3.6-2fixed
lua5.4 (PTS)bullseye5.4.2-2vulnerable
bookworm5.4.4-3+deb12u1fixed
sid, trixie5.4.6-3fixed
lua50 (PTS)bullseye5.0.3-8.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lua5.1source(unstable)(not affected)
lua5.2source(unstable)(not affected)
lua5.3source(unstable)(not affected)
lua5.4source(unstable)5.4.4-11000228
lua50source(unstable)(not affected)

Notes

[bullseye] - lua5.4 <no-dsa> (Minor issue)
- lua5.3 <not-affected> (Vulnerable code not present)
- lua5.2 <not-affected> (Vulnerable code not present)
- lua5.1 <not-affected> (Vulnerable code not present)
- lua50 <not-affected> (Vulnerable code not present)
http://lua-users.org/lists/lua-l/2021-10/msg00123.html
http://lua-users.org/lists/lua-l/2021-11/msg00015.html
Introduced by: https://github.com/lua/lua/commit/287b302acb8d925178e9edb800f0a8d18c7d35f6 (v5.4.2)
Fixed by: https://github.com/lua/lua/commit/74d99057a5146755e737c479850f87fd0e3b6868 (v5.4.4)
Cf. http://lua-users.org/lists/lua-l/2023-06/msg00059.html
Cf. http://lua-users.org/lists/lua-l/2023-06/msg00063.html

Search for package or bug name: Reporting problems