Bug 36333

Summary: lua5.1: Buffer overflow (4.0)
Product: UCS Reporter: Stefan Gohmann <gohmann>
Component: Security updatesAssignee: Security maintainers <security-maintainers>
Status: RESOLVED DUPLICATE QA Contact:
Severity: normal    
Priority: P3 CC: gohmann, jmm
Version: UCS 4.0   
Target Milestone: UCS 4.0-x-errata   
Hardware: Other   
OS: Linux   
See Also: https://forge.univention.org/bugzilla/show_bug.cgi?id=36241
What kind of report is it?: --- What type of bug is this?: ---
Who will be affected by this bug?: --- How will those affected feel about the bug?: ---
User Pain: Enterprise Customer affected?:
School Customer affected?: ISV affected?:
Waiting Support: Flags outvoted (downgraded) after PO Review:
Ticket number: Bug group (optional):
Max CVSS v3 score:

Description Stefan Gohmann univentionstaff 2014-10-29 07:27:22 CET
+++ This bug was initially created as a clone of Bug #35771 +++

+++ This bug was initially created as a clone of Bug #35770 +++

CVE-2014-5461

A buffer overflow in Lua's function parsing allows the execution of arbitrary and as a consequence the breakout of the sandbox.
Comment 1 Stefan Gohmann univentionstaff 2014-11-01 01:04:29 CET
Will be done with Bug #36241.

*** This bug has been marked as a duplicate of bug 36241 ***