drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in lua
Name: |
Pufferüberlauf in lua |
|
ID: |
FEDORA-2020-38e35de8aa |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 33 |
|
Datum: |
Sa, 26. September 2020, 07:57 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24342 |
|
Applikationen: |
Lua |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2020-38e35de8aa 2020-09-25 16:31:57.892412 ------------------------------------------------------------------------------- -
Name : lua Product : Fedora 33 Version : 5.4.0 Release : 7.fc33 URL : http://www.lua.org/ Summary : Powerful light-weight programming language Description : Lua is a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language. Lua is free software. Lua combines simple procedural syntax with powerful data description constructs based on associative arrays and extensible semantics. Lua is dynamically typed, interpreted from bytecodes, and has automatic memory management with garbage collection, making it ideal for configuration, scripting, and rapid prototyping.
------------------------------------------------------------------------------- - Update Information:
Fix CVE-2020-24342 lua: buffer overflow in luaO_pushvfstring ------------------------------------------------------------------------------- - ChangeLog:
* Wed Sep 2 2020 Tom Callaway <spot@fedoraproject.org> - 5.4.0-7 - apply upstream fix for CVE-2020-24342 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1873084 - CVE-2020-24342 lua: buffer overflow in luaO_pushvfstring https://bugzilla.redhat.com/show_bug.cgi?id=1873084 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2020-38e35de8aa' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
|
|
|
|