Severity
8.8HIGHNVD
EPSS
1.2%
top 20.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 21
Latest updateJun 30

Description

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages5 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4f5v-4r5w-g4x3: Lua through 52022-05-24
OSV
CVE-2020-15888: Lua through 52020-07-21

📋Vendor Advisories

3
Microsoft
Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection leading to a heap-based buffer overflow heap-based buffer over-read or use-after-free.2020-07-14
Red Hat
lua: stack resizes and garbage collection leads to heap-based buffer overflow2020-07-06
Debian
CVE-2020-15888: lua5.4 - Lua through 5.4.0 mishandles the interaction between stack resizes and garbage c...2020

📄Research Papers

1
arXiv
Threat Assessment in Machine Learning based Systems2022-06-30

💬Community

2
Bugzilla
CVE-2020-15888 lua: stack resizes and garbage collection leads to heap-based buffer overflow2020-07-24
Bugzilla
CVE-2020-15888 lua: stack resizes and garbage collection leads to heap-based buffer overflow [fedora-all]2020-07-24
CVE-2020-15888 — Out-of-bounds Read in Debian Lua5.4 | cvebase