Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15888

Опубликовано: 21 июл. 2020
Источник: debian
EPSS Низкий

Описание

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lua5.4fixed5.4.1-1package

Примечания

  • http://lua-users.org/lists/lua-l/2020-07/msg00053.html

  • http://lua-users.org/lists/lua-l/2020-07/msg00054.html

  • http://lua-users.org/lists/lua-l/2020-07/msg00071.html

  • http://lua-users.org/lists/lua-l/2020-07/msg00079.html

  • https://github.com/lua/lua/commit/6298903e35217ab69c279056f925fb72900ce0b7

  • https://github.com/lua/lua/commit/eb41999461b6f428186c55abd95f4ce1a76217d5

EPSS

Процентиль: 79%
0.01248
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 5 лет назад

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

CVSS3: 8.8
redhat
больше 5 лет назад

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

CVSS3: 8.8
nvd
больше 5 лет назад

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

CVSS3: 8.8
msrc
больше 5 лет назад

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection leading to a heap-based buffer overflow heap-based buffer over-read or use-after-free.

CVSS3: 8.8
github
больше 3 лет назад

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

EPSS

Процентиль: 79%
0.01248
Низкий