CVE-2019-6706

NameCVE-2019-6706
DescriptionLua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs920321

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lua5.1 (PTS)jessie5.1.5-7.1fixed
buster, sid, stretch5.1.5-8.1fixed
lua5.2 (PTS)jessie5.2.3-1.1fixed
buster, sid, stretch5.2.4-1.1fixed
lua5.3 (PTS)stretch5.3.3-1vulnerable
buster, sid5.3.3-1.1vulnerable
lua50 (PTS)jessie5.0.3-7fixed
buster, sid, stretch5.0.3-8fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lua5.1source(unstable)(not affected)
lua5.2source(unstable)(not affected)
lua5.3source(unstable)(unfixed)medium920321
lua50source(unstable)(not affected)

Notes

- lua5.2 <not-affected> (Vulnerable code introduced later)
- lua5.1 <not-affected> (Vulnerable code introduced later)
- lua50 <not-affected> (Vulnerable code introduced later)
http://lua.2524044.n2.nabble.com/Bug-Report-Use-after-free-in-debug-upvaluejoin-tc7685506.html
lua50 and lua5.1 don't have the affected code.
lua5.2 is not vulnerable as it doesn't free the value before using it.

Search for package or bug name: Reporting problems