CVE-2019-19391

EUVD-2019-9012
In LuaJIT through 2.0.5, as used in Moonjit before 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective
Type Confusion
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 43%
Affected Products (NVD)
VendorProductVersion
luajitluajit
𝑥
≤ 2.0.5
moonjit_projectmoonjit
𝑥
< 2.1.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
luajit
bookworm
2.1.0~beta3+git20220320+dfsg-4.1
fixed
bullseye
unimportant
sid
2.1.0+openresty20240815-1
fixed
trixie
2.1.0+openresty20240815-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
luajit
bionic
not-affected
disco
ignored
eoan
ignored
focal
not-affected
groovy
ignored
hirsute
ignored
impish
ignored
jammy
not-affected
kinetic
ignored
lunar
ignored
mantic
ignored
noble
not-affected
trusty
not-affected
xenial
not-affected