First published: Wed Jan 23 2019(Updated: )
Lua 5.3.5 has a use-after-free in lua_upvaluejoin in lapi.c. For example, a crash outcome might be achieved by an attacker who is able to trigger a debug.upvaluejoin call in which the arguments have certain relationships.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lua Lua | =5.3.5 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6706 is a vulnerability in Lua 5.3.5 that allows an attacker to achieve a crash outcome by triggering a debug.upvaluejoin call with certain arguments.
The severity of CVE-2019-6706 is high, with a severity score of 7.5.
Lua 5.3.5 and Canonical Ubuntu Linux versions 16.04, 18.04, and 18.10 are affected by CVE-2019-6706.
An attacker can exploit CVE-2019-6706 by triggering a debug.upvaluejoin call with specific arguments.
Yes, you can find references for CVE-2019-6706 at the following links: http://lua-users.org/lists/lua-l/2019-01/msg00039.html, http://packetstormsecurity.com/files/151335/Lua-5.3.5-Use-After-Free.html, and https://access.redhat.com/security/cve/cve-2019-6706.