Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2014-5461

Published: 28 August 2014

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.

Priority

Medium

Status

Package Release Status
lua5.1
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise
Released (5.1.4-12ubuntu1.1)
trusty
Released (5.1.5-5ubuntu0.1)
upstream
Released (5.1.5-7)
utopic
Released (5.1.5-5ubuntu1)
vivid
Released (5.1.5-5ubuntu1)
wily
Released (5.1.5-5ubuntu1)
xenial
Released (5.1.5-5ubuntu1)
yakkety
Released (5.1.5-5ubuntu1)
zesty
Released (5.1.5-5ubuntu1)
lua5.2
Launchpad, Ubuntu, Debian
lucid Does not exist

precise
Released (5.2.0-2ubuntu0.1)
trusty Not vulnerable
(5.2.3-1)
upstream
Released (5.2.3-1)
utopic Not vulnerable

vivid Not vulnerable

wily Not vulnerable

xenial Not vulnerable

yakkety Not vulnerable

zesty Not vulnerable

Patches:
upstream: http://www.lua.org/bugs.html#5.2.2-1
lua50
Launchpad, Ubuntu, Debian
lucid Ignored
(end of life)
precise Ignored
(end of life)
trusty Does not exist
(trusty was not-affected [5.0.3-7])
upstream Not vulnerable

utopic Ignored
(end of life)
wily Ignored
(end of life)
xenial Not vulnerable
(5.0.3-7)
yakkety Ignored
(end of life)
zesty Not vulnerable
(5.0.3-8)
vivid Ignored
(end of life)