Bug 36332

Summary: lua50: Buffer overflow (4.0)
Product: UCS Reporter: Stefan Gohmann <gohmann>
Component: Security updatesAssignee: Janek Walkenhorst <walkenhorst>
Status: CLOSED FIXED QA Contact: Moritz Muehlenhoff <jmm>
Severity: normal    
Priority: P3 CC: gohmann, jmm
Version: UCS 4.0   
Target Milestone: UCS 4.0-0-errata   
Hardware: Other   
OS: Linux   
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:

Description Stefan Gohmann univentionstaff 2014-10-29 07:24:41 CET
+++ This bug was initially created as a clone of Bug #35770 +++

CVE-2014-5461

A buffer overflow in Lua's function parsing allows the execution of arbitrary and as a consequence the breakout of the sandbox.
Comment 1 Moritz Muehlenhoff univentionstaff 2015-01-13 12:00:26 CET
Accidently closed, reopen
Comment 2 Janek Walkenhorst univentionstaff 2015-01-16 17:04:24 CET
Patch ported.
Tests: OK
Advisory: 2015-01-16-lua50.yaml
Comment 3 Moritz Muehlenhoff univentionstaff 2015-01-19 14:58:33 CET
Update ok, YAML file ok.
Comment 4 Janek Walkenhorst univentionstaff 2015-01-21 14:17:01 CET
<http://errata.univention.de/ucs/4.0/38.html>