Bug 37242 - lua5.1: Buffer overflow (ES 3.1)
lua5.1: Buffer overflow (ES 3.1)
Status: CLOSED WONTFIX
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 3.1
Other Linux
: P5 normal (vote)
: UCS 3.1-ES
Assigned To: Arvid Requate
Janek Walkenhorst
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2014-12-08 15:46 CET by Moritz Muehlenhoff
Modified: 2016-06-14 17:53 CEST (History)
3 users (show)

See Also:
What kind of report is it?: ---
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Moritz Muehlenhoff univentionstaff 2014-12-08 15:46:15 CET
CVE-2014-5461

A buffer overflow in Lua's function parsing allows the execution of arbitrary and as a consequence the breakout of the sandbox.
Comment 1 Arvid Requate univentionstaff 2016-06-13 13:36:18 CEST
Doesn't affect server components. The package is required by wireshark-common and nmap.
Comment 2 Janek Walkenhorst univentionstaff 2016-06-14 17:42:55 CEST
(In reply to Arvid Requate from comment #1)
> Doesn't affect server components. The package is required by
> wireshark-common and nmap.
I concur.