RSS   Podatności dla 'LUA'   RSS

2022-04-08
 
CVE-2022-28805

CWE-125
 

 
singlevar in lparser.c in Lua through 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.

 
2022-03-14
 
CVE-2021-44964

CWE-416
 

 
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.

 
2021-11-09
 
CVE-2021-43519

CWE-787
 

 
Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.

 
2020-08-17
 
CVE-2020-24371

CWE-763
 

 
lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.

 
 
CVE-2020-24370

CWE-191
 

 
ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).

 
 
CVE-2020-24369

CWE-476
 

 
ldebug.c in Lua 5.4.0 attempts to access debug information via the line hook of a stripped function, leading to a NULL pointer dereference.

 
2020-08-13
 
CVE-2020-24342

CWE-119
 

 
Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.

 
2020-07-24
 
CVE-2020-15945

NVD-CWE-Other
 

 
Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.

 
2020-07-21
 
CVE-2020-15889

CWE-125
 

 
Lua through 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.

 
 
CVE-2020-15888

CWE-120
 

 
Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

 


Copyright 2022, cxsecurity.com

 

Back to Top