CVE-2020-15888

NameCVE-2020-15888
DescriptionLua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lua5.1 (PTS)bullseye, sid, buster, stretch5.1.5-8.1undetermined
lua5.2 (PTS)bullseye, sid, buster, stretch5.2.4-1.1undetermined
lua5.3 (PTS)stretch5.3.3-1undetermined
bullseye, sid, buster5.3.3-1.1undetermined
lua5.4 (PTS)bullseye, sid5.4.0-2vulnerable
lua50 (PTS)bullseye, sid, buster, stretch5.0.3-8undetermined

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lua5.1source(unstable)undetermined
lua5.2source(unstable)undetermined
lua5.3source(unstable)undetermined
lua5.4source(unstable)(unfixed)
lua50source(unstable)undetermined

Notes

http://lua-users.org/lists/lua-l/2020-07/msg00053.html
http://lua-users.org/lists/lua-l/2020-07/msg00054.html
http://lua-users.org/lists/lua-l/2020-07/msg00071.html
http://lua-users.org/lists/lua-l/2020-07/msg00079.html
https://github.com/lua/lua/commit/6298903e35217ab69c279056f925fb72900ce0b7
https://github.com/lua/lua/commit/eb41999461b6f428186c55abd95f4ce1a76217d5
check details for older versions

Search for package or bug name: Reporting problems