Bug 35770 - lua50: Buffer overflow (3.2)
lua50: Buffer overflow (3.2)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.2
Other Linux
: P3 normal (vote)
: UCS 3.2-3-errata
Assigned To: Philipp Hahn
Stefan Gohmann
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-09-02 10:01 CEST by Moritz Muehlenhoff
Modified: 2015-03-31 14:48 CEST (History)
3 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-09-02 10:01:05 CEST
CVE-2014-5461

A buffer overflow in Lua's function parsing allows the execution of arbitrary and as a consequence the breakout of the sandbox.
Comment 1 Philipp Hahn univentionstaff 2014-10-29 00:03:54 CET
r13930 | Packport lua51/debian/patches/0004-Fix-stack-overflow-in-vararg-functions.dpatch

Package: lua50
Version: 5.0.3-4.13.201410282352
Branch: ucs_3.2-0
Scope: errata3.2-3

r55060 | Bug #35770 LUA: CVE-2014-5461
 2014-10-28-lua50.yaml

OK: errata-test 10.200.17.X lua50 # amd64 i386
Comment 2 Stefan Gohmann univentionstaff 2014-10-29 08:33:38 CET
ucs-test: OK

YAML: OK

Code review: OK

UCS 4.0 merge: The package has not been fixed in Debian wheezy. I've cloned this bug: Bug #36332 

Test: OK
Comment 3 Janek Walkenhorst univentionstaff 2014-10-30 14:15:06 CET
http://errata.univention.de/ucs/3.2/233.html