CVE-2019-6706

NameCVE-2019-6706
DescriptionLua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3469-1
Debian Bugs920321

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lua5.1 (PTS)bullseye5.1.5-8.1fixed
bookworm5.1.5-9fixed
sid, trixie5.1.5-10fixed
lua5.2 (PTS)bullseye5.2.4-1.1fixed
bookworm, sid, trixie5.2.4-3fixed
lua5.3 (PTS)bullseye5.3.3-1.1+deb11u1fixed
bookworm, sid, trixie5.3.6-2fixed
lua50 (PTS)bullseye5.0.3-8.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lua5.1source(unstable)(not affected)
lua5.2source(unstable)(not affected)
lua5.3sourcebuster5.3.3-1.1+deb10u1DLA-3469-1
lua5.3sourcebullseye5.3.3-1.1+deb11u1
lua5.3source(unstable)5.3.6-1920321
lua50source(unstable)(not affected)

Notes

- lua5.2 <not-affected> (Vulnerable code introduced later)
- lua5.1 <not-affected> (Vulnerable code introduced later)
- lua50 <not-affected> (Vulnerable code introduced later)
http://lua-users.org/lists/lua-l/2019-01/msg00039.html
lua50 and lua5.1 don't have the affected code.
lua5.2 is not vulnerable as it doesn't free the value before using it.
https://github.com/lua/lua/commit/89aee84cbc9224f638f3b7951b306d2ee8ecb71e (v5.3.6)

Search for package or bug name: Reporting problems