Vulnerability Description
Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lua | Lua | 5.4.0 |
| Fedoraproject | Fedora | 33 |
Related Weaknesses (CWE)
References
- http://lua-users.org/lists/lua-l/2020-07/msg00052.htmlExploitMailing ListVendor Advisory
- https://github.com/lua/lua/commit/34affe7a63fc5d842580a9f23616d057e17dfe27PatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- http://lua-users.org/lists/lua-l/2020-07/msg00052.htmlExploitMailing ListVendor Advisory
- https://github.com/lua/lua/commit/34affe7a63fc5d842580a9f23616d057e17dfe27PatchThird Party Advisory
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
FAQ
What is CVE-2020-24342?
CVE-2020-24342 is a vulnerability with a CVSS score of 7.8 (HIGH). Lua through 5.4.0 allows a stack redzone cross in luaO_pushvfstring because a protection mechanism wrongly calls luaD_callnoyield twice in a row.
How severe is CVE-2020-24342?
CVE-2020-24342 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-24342?
Check the references section above for vendor advisories and patch information. Affected products include: Lua Lua, Fedoraproject Fedora.