CVE-2019-19391

In LuaJIT through 2.0.5, as used in Moonjit before 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective
References
Link Resource
https://github.com/LuaJIT/LuaJIT/pull/526 Issue Tracking Patch Third Party Advisory
https://github.com/LuaJIT/LuaJIT/pull/526 Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:luajit:luajit:*:*:*:*:*:*:*:*
cpe:2.3:a:moonjit_project:moonjit:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:34

Type Values Removed Values Added
References () https://github.com/LuaJIT/LuaJIT/pull/526 - Issue Tracking, Patch, Third Party Advisory () https://github.com/LuaJIT/LuaJIT/pull/526 - Issue Tracking, Patch, Third Party Advisory

07 Nov 2023, 03:07

Type Values Removed Values Added
Summary ** DISPUTED ** In LuaJIT through 2.0.5, as used in Moonjit before 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective. In LuaJIT through 2.0.5, as used in Moonjit before 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective

Information

Published : 2019-11-29 16:15

Updated : 2024-11-21 04:34


NVD link : CVE-2019-19391

Mitre link : CVE-2019-19391

CVE.ORG link : CVE-2019-19391


JSON object : View

Products Affected

luajit

  • luajit

moonjit_project

  • moonjit
CWE
CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')