Malware Devil

Thursday, July 1, 2021

ESB-2021.2292 – [SUSE] lua53: Denial of service – Remote/unauthenticated

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

===========================================================================
AUSCERT External Security Bulletin Redistribution

ESB-2021.2292
Security update for lua53
1 July 2021

===========================================================================

AusCERT Security Bulletin Summary
———————————

Product: lua53
Publisher: SUSE
Operating System: SUSE
Impact/Access: Denial of Service — Remote/Unauthenticated
Resolution: Patch/Upgrade
CVE Names: CVE-2020-24371 CVE-2020-24370

Reference: ESB-2020.3317

Original Bulletin:
https://www.suse.com/support/update/announcement/2021/suse-su-20212196-1

– ————————–BEGIN INCLUDED TEXT——————–

SUSE Security Update: Security update for lua53

______________________________________________________________________________

Announcement ID: SUSE-SU-2021:2196-1
Rating: moderate
References: #1175448 #1175449
Cross-References: CVE-2020-24370 CVE-2020-24371
Affected Products:
SUSE MicroOS 5.0
SUSE Linux Enterprise Module for Basesystem 15-SP3
SUSE Linux Enterprise Module for Basesystem 15-SP2
______________________________________________________________________________

An update that fixes two vulnerabilities is now available.

Description:

This update for lua53 fixes the following issues:
Update to version 5.3.6:

o CVE-2020-24371: lgc.c mishandles the interaction between barriers and the
sweep phase, leading to a memory access violation involving collectgarbage
(bsc#1175449)
o CVE-2020-24370: ldebug.c allows a negation overflow and segmentation fault
in getlocal and setlocal (bsc#1175448)
o Long brackets with a huge number of ‘=’ overflow some internal buffer
arithmetic.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or “zypper patch”.
Alternatively you can run the command listed for your product:

o SUSE MicroOS 5.0:
zypper in -t patch SUSE-SUSE-MicroOS-5.0-2021-2196=1
o SUSE Linux Enterprise Module for Basesystem 15-SP3:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2021-2196=1
o SUSE Linux Enterprise Module for Basesystem 15-SP2:
zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2021-2196=1

Package List:

o SUSE MicroOS 5.0 (aarch64 x86_64):
liblua5_3-5-5.3.6-3.6.1
liblua5_3-5-debuginfo-5.3.6-3.6.1
lua53-debuginfo-5.3.6-3.6.1
lua53-debugsource-5.3.6-3.6.1
o SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x
x86_64):
liblua5_3-5-5.3.6-3.6.1
liblua5_3-5-debuginfo-5.3.6-3.6.1
lua53-5.3.6-3.6.1
lua53-debuginfo-5.3.6-3.6.1
lua53-debugsource-5.3.6-3.6.1
lua53-devel-5.3.6-3.6.1
o SUSE Linux Enterprise Module for Basesystem 15-SP3 (x86_64):
liblua5_3-5-32bit-5.3.6-3.6.1
liblua5_3-5-32bit-debuginfo-5.3.6-3.6.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (aarch64 ppc64le s390x
x86_64):
liblua5_3-5-5.3.6-3.6.1
liblua5_3-5-debuginfo-5.3.6-3.6.1
lua53-5.3.6-3.6.1
lua53-debuginfo-5.3.6-3.6.1
lua53-debugsource-5.3.6-3.6.1
lua53-devel-5.3.6-3.6.1
o SUSE Linux Enterprise Module for Basesystem 15-SP2 (x86_64):
liblua5_3-5-32bit-5.3.6-3.6.1
liblua5_3-5-32bit-debuginfo-5.3.6-3.6.1

References:

o https://www.suse.com/security/cve/CVE-2020-24370.html
o https://www.suse.com/security/cve/CVE-2020-24371.html
o https://bugzilla.suse.com/1175448
o https://bugzilla.suse.com/1175449

– ————————–END INCLUDED TEXT——————–

You have received this e-mail bulletin as a result of your organisation’s
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT’s members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation’s
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author’s website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
—–BEGIN PGP SIGNATURE—–
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBYN0ijuNLKJtyKPYoAQhCtBAAskMKIAQdXkcc3eLQJ3bUbYLQYW/KwdQn
lSAQ/zc49ewzwSlc+IXyP7h82QUVIHNEwG+bnlVBoAVsrTNJWE9QqzhsezzIltTt
DW/SV/VQ5p2WTFk6yyPW1AafQqOtZBPa6lBRHVINrhqqvW8JJtCDgzKz13IvYRbU
MjuQ7gd+ae/AWO7fe04Ke/bZVey9hHQcwxz9l43Uqwp559F9IltFkZBHn3ccWSso
ywNUI1OKyL18HvHhy3cPzjcC5dXbAeM+ahaoNQ80Uywzqw6r/dyegMyTsA7uJ0Va
NI/EKnr2h2CDh36JfXq/RD/Kj/PvyK2fLNd487fXfDMc67MsSpSgH/CZ9SrAMmVE
rX517F42I6RNtdRkYjsiWiaW+H5KG38hgqM87UO8pv5zmgGiApEWIsnkx8Xm9ePU
6TqGvz9qpHULSCY7a+b9OH92uHKshHl1NkugU3NKiVq1PYO81dHBa9IoreHpnHlD
iOh8FL8MrwGq40tndBKPIiALKH6JyuHl4y3QyjCJnT0qL+x65FJqifOFseMV0SlN
O821l1FQII0QRR33st87Arn+FXslEfn69fHwcv79pT1gXlf9Qcau7O2PE+3C+U7L
pCDMq5rNA7dCam5k5JcWJukFqpSDSiEPzEevUbX97xd894eqb9QW/DiNAE1C74v2
ekyliLNWf+s=
=BkmU
—–END PGP SIGNATURE—–

Read More

The post ESB-2021.2292 – [SUSE] lua53: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2021/07/01/esb-2021-2292-suse-lua53-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-2292-suse-lua53-denial-of-service-remote-unauthenticated

No comments:

Post a Comment

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...