It was discovered that Lua did not properly generate code when "_ENV" is constant. An attacker could possibly use this issue to cause a denial of service or execute arbitrary unstrusted lua code. (CVE-2022-28805)
It was discovered that Lua did not properly handle C stack overflows during error handling. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-33099)
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "5.4.4-1ubuntu0.1~esm1", "binary_name": "liblua5.4-0" }, { "binary_version": "5.4.4-1ubuntu0.1~esm1", "binary_name": "liblua5.4-0-dbg" }, { "binary_version": "5.4.4-1ubuntu0.1~esm1", "binary_name": "liblua5.4-dev" }, { "binary_version": "5.4.4-1ubuntu0.1~esm1", "binary_name": "lua5.4" } ] }