Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-25178

Опубликовано: 07 июл. 2025
Источник: debian
EPSS Низкий

Описание

LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
luajitfixed2.1.0+openresty20240314-1package
luajitfixed2.1.0~beta3+git20220320+dfsg-4.1+deb12u1bookwormpackage

Примечания

  • https://github.com/LuaJIT/LuaJIT/issues/1152

  • Fixed by: https://github.com/LuaJIT/LuaJIT/commit/defe61a56751a0db5f00ff3ab7b8f45436ba74c8 (v2.1)

EPSS

Процентиль: 32%
0.00123
Низкий

Связанные уязвимости

CVSS3: 9.1
ubuntu
7 месяцев назад

LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.

CVSS3: 1.9
redhat
7 месяцев назад

LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.

CVSS3: 9.1
nvd
7 месяцев назад

LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.

CVSS3: 9.1
msrc
7 месяцев назад

LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.

CVSS3: 9.1
github
7 месяцев назад

LuaJIT through 2.1 has an out-of-bounds read in the stack-overflow handler in lj_state.c

EPSS

Процентиль: 32%
0.00123
Низкий