Gentoo Linux Security Advisory 202305-23 - Multiple vulnerabilities have been discovered in Lua, the worst of which could result in arbitrary code execution.
00aefb3377c44926da8759cd1d9a0caff52ef4beac1d0f7f4a215d7820e9e283
Gentoo Linux Security Advisory 201701-53 - A buffer overflow in Lua might allow context-dependent attackers to execute arbitrary code. Versions less than 5.1.5-r4 are affected.
0a382c25aac7198b837b9c3b7a6af9b05b386e38bba1e14eceec6b62ae70f85a
Mandriva Linux Security Advisory 2015-144 - A heap-based overflow vulnerability was found in the way Lua handles varargs functions with many fixed parameters called with few arguments, leading to application crashes or, potentially, arbitrary code execution.
ac31acf6c259ead6e52e4fece7f7a93fe4218899d8b08dda8607eb133e8f7679
Mandriva Linux Security Advisory 2014-205 - A heap-based overflow vulnerability was found in the way Lua handles varargs functions with many fixed parameters called with few arguments, leading to application crashes or, potentially, arbitrary code execution.
41c0ce842fa436a99105fa93c7f6ee89798757ba9363750bbb92eb41d89a0574
Ubuntu Security Notice 2338-1 - It was discovered that Lua incorrectly handled certain vararg functions with a large number of fixed parameters. An attacker could use this issue to cause Lua applications to crash, resulting in a denial of service, or possibly execute arbitrary code.
742386c70e5001c109ed1b9fd23764fe2289037eeb35b4ae341694d1484682de
Debian Linux Security Advisory 3015-1 - A heap-based overflow vulnerability was found in the way Lua, a simple, extensible, embeddable programming language, handles varargs functions with many fixed parameters called with few arguments, leading to application crashes or, potentially, arbitrary code execution.
08d936ff79542fbe391fe2ed9161089263714f74f69a38383de657f660aeebf2
Debian Linux Security Advisory 3016-1 - A heap-based overflow vulnerability was found in the way Lua, a simple, extensible, embeddable programming language, handles varargs functions with many fixed parameters called with few arguments, leading to application crashes or, potentially, arbitrary code execution.
b7cb2a0b0cf0c1c23b6934bdb7db254c50a5071d9ac48f83383b5b00a704724c