Note:
This project will be discontinued after December 13, 2021. [more]
2014-09-04
Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
Products | Ubuntu_linux, Debian_linux, Lua, Mageia, Opensuse |
Type | Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) |
First patch | - None (likely due to unavailable code) |
Links |
• http://www.ubuntu.com/usn/USN-2338-1
• http://www.debian.org/security/2014/dsa-3015 • http://secunia.com/advisories/60869 • http://www.debian.org/security/2014/dsa-3016 • https://security.gentoo.org/glsa/202305-23
• http://advisories.mageia.org/MGASA-2014-0414.html
• http://www.mandriva.com/security/advisories?name=MDVSA-2015:144 • http://lists.opensuse.org/opensuse-updates/2014-09/msg00030.html • https://security.gentoo.org/glsa/201701-53 • http://www.lua.org/bugs.html#5.2.2-1 • http://www.securityfocus.com/bid/69342 • http://secunia.com/advisories/59890 • http://www.openwall.com/lists/oss-security/2014/08/27/2 • http://secunia.com/advisories/61411 • http://www.openwall.com/lists/oss-security/2014/08/21/4 • http://www.openwall.com/lists/oss-security/2014/08/21/1 |