Debian Lua5.3 vulnerabilities

9 known vulnerabilities affecting debian/lua5.3.

Total CVEs
9
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
MEDIUM1LOW8

Vulnerabilities

Page 1 of 1
CVE-2022-28805LOWCVSS 9.1fixed in lua5.4 5.4.4-2 (bookworm)2022
CVE-2022-28805 [CRITICAL] CVE-2022-28805: lua5.1 - singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lac... singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2022-33099LOWCVSS 7.5fixed in lua5.4 5.4.4-3 (bookworm)2022
CVE-2022-33099 [HIGH] CVE-2022-33099: lua5.1 - An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-... An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2021-45985LOWCVSS 7.5fixed in lua5.4 5.4.4-1 (bookworm)2021
CVE-2021-45985 [HIGH] CVE-2021-45985: lua5.1 - In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-b... In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2021-44647LOWCVSS 5.5fixed in lua5.4 5.4.4-1 (bookworm)2021
CVE-2021-44647 [MEDIUM] CVE-2021-44647: lua5.1 - Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode ... Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2021-43519LOWCVSS 5.5fixed in lua5.4 5.4.4-1 (bookworm)2021
CVE-2021-43519 [MEDIUM] CVE-2021-43519: lua5.1 - Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows atta... Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2020-24370MEDIUMCVSS 5.3fixed in lua5.3 5.3.6-1 (bookworm)2020
CVE-2020-24370 [MEDIUM] CVE-2020-24370: lua5.3 - ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlo... ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31). Scope: local bookworm: resolved (fixed in 5.3.6-1) bullseye: resolved (fixed in 5.3.3-1.1+deb11u1) forky: resolved (fixed in 5.3.6-1) sid: resolved (fixed in 5.3.6-1) trixie: resolved (fixed in 5.3.6-1)
debian
CVE-2020-15945LOWCVSS 5.5fixed in lua5.4 5.4.1-1 (bookworm)2020
CVE-2020-15945 [MEDIUM] CVE-2020-15945: lua5.1 - Lua 5.4.0 (fixed in 5.4.1) has a segmentation fault in changedline in ldebug.c (... Lua 5.4.0 (fixed in 5.4.1) has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2020-24371LOWCVSS 5.3fixed in lua5.4 5.4.1-1 (bookworm)2020
CVE-2020-24371 [MEDIUM] CVE-2020-24371: lua5.3 - lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep pha... lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2019-6706LOWCVSS 7.5PoCfixed in lua5.3 5.3.6-1 (bookworm)2019
CVE-2019-6706 [HIGH] CVE-2019-6706: lua5.1 - Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a cras... Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian