CVE-2019-19391

In LuaJIT through 2.0.5, as used in Moonjit before 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective
Type Confusion
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
mitreCNA
---
---
CISA-ADPADP
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 55%
VendorProductVersion
luajitluajit
𝑥
≤ 2.0.5
moonjit_projectmoonjit
𝑥
< 2.1.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
luajit
bullseye
unimportant
bookworm
2.1.0~beta3+git20220320+dfsg-4.1
fixed
sid
2.1.0+openresty20240815-1
fixed
trixie
2.1.0+openresty20240815-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
luajit
noble
not-affected
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
not-affected
impish
ignored
hirsute
ignored
groovy
ignored
focal
not-affected
eoan
ignored
disco
ignored
bionic
not-affected
xenial
not-affected
trusty
not-affected