Lua Lua

Do you want an email whenever new security vulnerabilities are reported in Lua?

By the Year

In 2024 there have been 0 vulnerabilities in Lua . Last year Lua had 1 security vulnerability published. Right now, Lua is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 1 7.50
2022 4 7.10
2021 1 5.50
2020 4 6.23
2019 1 7.50
2018 0 0.00

It may take a day or so for new Lua vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Lua Security Vulnerabilities

In Lua 5.4.3

CVE-2021-45985 7.5 - High - April 10, 2023

In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

Memory Corruption

An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.

CVE-2022-33099 7.5 - High - July 01, 2022

An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.

Memory Corruption

singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read

CVE-2022-28805 9.1 - Critical - April 08, 2022

singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.

Out-of-bounds Read

Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3

CVE-2021-44964 6.3 - Medium - March 14, 2022

Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.

Dangling pointer

Lua v5.4.3 and above are affected by SEGV by type confusion in funcname

CVE-2021-44647 5.5 - Medium - January 11, 2022

Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.

Object Type Confusion

Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4

CVE-2021-43519 5.5 - Medium - November 09, 2021

Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.

Stack Exhaustion

ldebug.c in Lua 5.4.0

CVE-2020-24370 5.3 - Medium - August 17, 2020

ldebug.c in Lua 5.4.0 allows a negation overflow and segmentation fault in getlocal and setlocal, as demonstrated by getlocal(3,2^31).

Integer underflow

lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase

CVE-2020-24371 5.3 - Medium - August 17, 2020

lgc.c in Lua 5.4.0 mishandles the interaction between barriers and the sweep phase, leading to a memory access violation involving collectgarbage.

Release of Invalid Pointer or Reference

Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g

CVE-2020-15945 5.5 - Medium - July 24, 2020

Lua through 5.4.0 has a segmentation fault in changedline in ldebug.c (e.g., when called by luaG_traceexec) because it incorrectly expects that an oldpc value is always updated upon a return of the flow of control to a function.

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection

CVE-2020-15888 8.8 - High - July 21, 2020

Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.

Out-of-bounds Read

Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c

CVE-2019-6706 7.5 - High - January 23, 2019

Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.

Dangling pointer

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3

CVE-2014-5461 - September 04, 2014

Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.

Buffer Overflow

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Mageia or by Lua? Click the Watch button to subscribe.

Lua
Vendor

Lua
Product

subscribe