MGASA-2014-0414

Source
https://advisories.mageia.org/MGASA-2014-0414.html
Import Source
https://advisories.mageia.org/MGASA-2014-0414.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0414
Related
Published
2014-10-23T13:27:57Z
Modified
2014-10-23T13:06:25Z
Summary
Updated lua and lua5.1 packages fix security vulnerability
Details

A heap-based overflow vulnerability was found in the way Lua handles varargs functions with many fixed parameters called with few arguments, leading to application crashes or, potentially, arbitrary code execution (CVE-2014-5461).

References
Credits

Affected packages

Mageia:3 / lua5.1

Package

Name
lua5.1
Purl
pkg:rpm/mageia/lua5.1?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.5-2.2.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / lua

Package

Name
lua
Purl
pkg:rpm/mageia/lua?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.2.2-1.1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / lua5.1

Package

Name
lua5.1
Purl
pkg:rpm/mageia/lua5.1?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.5-4.1.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / lua

Package

Name
lua
Purl
pkg:rpm/mageia/lua?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.2.2-2.1.mga4

Ecosystem specific

{
    "section": "core"
}