First published: Tue Jul 21 2020(Updated: )
Lua through 5.4.0 mishandles the interaction between stack resizes and garbage collection, leading to a heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lua Lua | =5.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15888 is a vulnerability in Lua versions up to and including 5.4.0 that mishandles the interaction between stack resizes and garbage collection, leading to various memory-related issues.
The severity of CVE-2020-15888 is high, with a CVSS score of 8.8.
The vulnerability affects Lua version 5.4.0.
The possible consequences of CVE-2020-15888 include heap-based buffer overflow, heap-based buffer over-read, or use-after-free.
At the moment, there is no known fix for CVE-2020-15888. It is recommended to follow the official Lua documentation for updates and security patches.