Lua

Lua

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.23%
  • Veröffentlicht 13.08.2020 19:15:13
  • Zuletzt bearbeitet 21.11.2024 05:14:37

Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.

Exploit
  • EPSS 0.12%
  • Veröffentlicht 24.07.2020 21:15:34
  • Zuletzt bearbeitet 19.02.2025 15:15:10

Lua 5.4.0 (fixed in 5.4.1) has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.

Exploit
  • EPSS 0.92%
  • Veröffentlicht 21.07.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:23

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

Exploit
  • EPSS 0.61%
  • Veröffentlicht 21.07.2020 22:15:12
  • Zuletzt bearbeitet 21.11.2024 05:06:23

Lua 5.4.0 has a getobjname heap-based buffer over-read because youngcollection in lgc.c uses markold for an insufficient number of list members.

Exploit
  • EPSS 0.92%
  • Veröffentlicht 23.01.2019 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:46:59

Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

Exploit
  • EPSS 18.47%
  • Veröffentlicht 04.09.2014 17:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.