There are 6 open security issues in bullseye.
6 issues left for the package maintainer to handle:
- CVE-2021-43519:
(needs triaging)
Stack overflow in lua_resume of ldo.c in Lua Interpreter 5.1.0~5.4.4 allows attackers to perform a Denial of Service via a crafted script file.
- CVE-2021-44647:
(needs triaging)
Lua v5.4.3 and above are affected by SEGV by type confusion in funcnamefromcode function in ldebug.c which can cause a local denial of service.
- CVE-2021-44964:
(needs triaging)
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
- CVE-2021-45985:
(needs triaging)
In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.
- CVE-2022-28805:
(needs triaging)
singlevar in lparser.c in Lua from (including) 5.4.0 up to (excluding) 5.4.4 lacks a certain luaK_exp2anyregup call, leading to a heap-based buffer over-read that might affect a system that compiles untrusted Lua code.
- CVE-2022-33099:
(needs triaging)
An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.
You can find information about how to handle these issues in the security team's documentation.