Vulnerability Database
Blog
FAQ
Docs
CVE-2024-25176
See a problem?
Please try reporting it
to the source
first.
Source
https://nvd.nist.gov/vuln/detail/CVE-2024-25176
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-25176.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-25176
Published
2025-07-07T17:15:27Z
Modified
2025-07-08T18:56:04.895840Z
Downstream
UBUNTU-CVE-2024-25176
Summary
[none]
Details
LuaJIT through 2.1 has a stack-buffer-overflow in lj
strfmt
wfnum in lj
strfmt
num.c.
References
https://github.com/LuaJIT/LuaJIT/commit/343ce0edaf3906a62022936175b2f5410024cbfc
https://github.com/LuaJIT/LuaJIT/issues/1149
https://gist.github.com/pwnhacker0x18/cd75d01fc7c9b6c85c183fbe5353d276
Affected packages
Git
/
github.com/luajit/luajit
Affected ranges
Type
GIT
Repo
https://github.com/luajit/luajit
Events
Introduced
0
Unknown introduced commit / All previous commits are affected
Fixed
343ce0edaf3906a62022936175b2f5410024cbfc
Affected versions
v2.*
v2.0.0
v2.0.0-beta1
v2.0.0-beta10
v2.0.0-beta11
v2.0.0-beta2
v2.0.0-beta2-hotfix2
v2.0.0-beta3
v2.0.0-beta4
v2.0.0-beta5
v2.0.0-beta6
v2.0.0-beta7
v2.0.0-beta8
v2.0.0-beta8-fixed
v2.0.0-beta9
v2.0.0-rc1
v2.0.0-rc2
v2.0.0-rc3
v2.0.1
v2.0.1-fixed
v2.0.2
v2.0.3
v2.0.4
v2.0.5
v2.0.ROLLING
v2.1.0-beta1
v2.1.0-beta2
v2.1.0-beta3
v2.1.ROLLING
CVE-2024-25176 - OSV