Uploaded image for project: 'Funtoo Linux'
  1. Funtoo Linux
  2. FL-7646

Vulnerabilities for lua

    • Icon: Security Vulnerability Security Vulnerability
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • None
    • Impacts dev-lang/lua and everything that uses it.
    • update to lua >=5.4.0

      CVE-2019-6706

      Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

      CVE-2020-15888

      Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

      CVE-2020-15945

      Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.

      CVE-2020-24342

      Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.

            Unassigned Unassigned
            tczaude tczaude
            Votes:
            0 Vote for this issue
            Watchers:
            5 Start watching this issue

              Created:
              Updated: