CVE-2014-5461

EUVD-2014-5348
Buffer overflow in the vararg functions in ldo.c in Lua 5.1 through 5.2.x before 5.2.3 allows context-dependent attackers to cause a denial of service (crash) via a small number of arguments to a function with a large number of fixed arguments.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 95%
Affected Products (NVD)
VendorProductVersion
opensuseopensuse
12.3
opensuseopensuse
13.1
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
debiandebian_linux
7.0
lualua
5.1
lualua
5.1.1
lualua
5.1.2
lualua
5.1.3
lualua
5.1.4
lualua
5.1.5
lualua
5.2.0
lualua
5.2.1
lualua
5.2.2
mageiamageia
3.0
mageiamageia
4.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
lua5.1
bookworm
5.1.5-9
fixed
bullseye
5.1.5-8.1
fixed
sid
5.1.5-9
fixed
trixie
5.1.5-9
fixed
lua5.2
bookworm
5.2.4-3
fixed
bullseye
5.2.4-1.1
fixed
sid
5.2.4-3
fixed
trixie
5.2.4-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lua5.1
lucid
ignored
precise
Fixed 5.1.4-12ubuntu1.1
released
trusty
Fixed 5.1.5-5ubuntu0.1
released
utopic
Fixed 5.1.5-5ubuntu1
released
vivid
Fixed 5.1.5-5ubuntu1
released
wily
Fixed 5.1.5-5ubuntu1
released
xenial
Fixed 5.1.5-5ubuntu1
released
yakkety
Fixed 5.1.5-5ubuntu1
released
zesty
Fixed 5.1.5-5ubuntu1
released
lua5.2
lucid
dne
precise
Fixed 5.2.0-2ubuntu0.1
released
trusty
not-affected
utopic
not-affected
vivid
not-affected
wily
not-affected
xenial
not-affected
yakkety
not-affected
zesty
not-affected
lua50
lucid
ignored
precise
ignored
trusty
dne
utopic
ignored
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
ignored
zesty
not-affected