CVE-2019-6706

Priority
Description
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a
crash outcome might be achieved by an attacker who is able to trigger a
debug.upvaluejoin call in which the arguments have certain relationships.
Assigned-to
leosilva
Notes
mdeslauras of 2019-02-28, proposed fix not committed
per debian, 5.0, 5.1 and 5.2 aren't affected
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):not-affected (code not present)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (5.3.1-1ubuntu2.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (5.3.3-1ubuntu0.18.04.1)
Package
Source: lua50 (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [code not present])
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
More Information

Updated: 2020-07-28 20:07:47 UTC (commit d26b6ca9f5b3adb89bb036ce73ae7dab894935ec)