CVE-2014-5461

Publication date 28 August 2014

Last updated 24 July 2024


Ubuntu priority

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.

Status

Package Ubuntu Release Status
lua5.1 17.04 zesty
Fixed 5.1.5-5ubuntu1
16.10 yakkety
Fixed 5.1.5-5ubuntu1
16.04 LTS xenial
Fixed 5.1.5-5ubuntu1
15.10 wily
Fixed 5.1.5-5ubuntu1
15.04 vivid
Fixed 5.1.5-5ubuntu1
14.10 utopic
Fixed 5.1.5-5ubuntu1
14.04 LTS trusty
Fixed 5.1.5-5ubuntu0.1
12.04 LTS precise
Fixed 5.1.4-12ubuntu1.1
10.04 LTS lucid Ignored end of life
lua5.2 17.04 zesty
Not affected
16.10 yakkety
Not affected
16.04 LTS xenial
Not affected
15.10 wily
Not affected
15.04 vivid
Not affected
14.10 utopic
Not affected
14.04 LTS trusty
Not affected
12.04 LTS precise
Fixed 5.2.0-2ubuntu0.1
10.04 LTS lucid Not in release
lua50 17.04 zesty
Not affected
16.10 yakkety Ignored end of life
16.04 LTS xenial
Not affected
15.10 wily Ignored end of life
15.04 vivid Ignored end of life
14.10 utopic Ignored end of life
14.04 LTS trusty Not in release
12.04 LTS precise Ignored end of life
10.04 LTS lucid Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
lua5.2