Bug 36332 - lua50: Buffer overflow (4.0)
lua50: Buffer overflow (4.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.0
Other Linux
: P3 normal (vote)
: UCS 4.0-0-errata
Assigned To: Janek Walkenhorst
Moritz Muehlenhoff
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-10-29 07:24 CET by Stefan Gohmann
Modified: 2015-01-21 14:17 CET (History)
2 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Stefan Gohmann univentionstaff 2014-10-29 07:24:41 CET
+++ This bug was initially created as a clone of Bug #35770 +++

CVE-2014-5461

A buffer overflow in Lua's function parsing allows the execution of arbitrary and as a consequence the breakout of the sandbox.
Comment 1 Moritz Muehlenhoff univentionstaff 2015-01-13 12:00:26 CET
Accidently closed, reopen
Comment 2 Janek Walkenhorst univentionstaff 2015-01-16 17:04:24 CET
Patch ported.
Tests: OK
Advisory: 2015-01-16-lua50.yaml
Comment 3 Moritz Muehlenhoff univentionstaff 2015-01-19 14:58:33 CET
Update ok, YAML file ok.
Comment 4 Janek Walkenhorst univentionstaff 2015-01-21 14:17:01 CET
<http://errata.univention.de/ucs/4.0/38.html>