9.1
CVSSv3

CVE-2019-19391

Published: 29/11/2019 Updated: 11/06/2024
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 9.1 | Impact Score: 5.2 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

In LuaJIT up to and including 2.0.5, as used in Moonjit prior to 2.1.2 and other products, debug.getinfo has a type confusion issue that leads to arbitrary memory write or read operations, because certain cases involving valid stack levels and > options are mishandled. NOTE: The LuaJIT project owner states that the debug libary is unsafe by definition and that this is not a vulnerability. When LuaJIT was originally developed, the expectation was that the entire debug library had no security guarantees and thus it made no sense to assign CVEs. However, not all users of later LuaJIT derivatives share this perspective

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

luajit luajit

moonjit project moonjit

Vendor Advisories

Debian Bug report logs - #946053 luajit: CVE-2019-19391 Package: src:luajit; Maintainer for src:luajit is Enrico Tassi <gareuselesinge@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 3 Dec 2019 13:03:02 UTC Severity: normal Tags: security, upstream Found in version luajit/210~beta3+d ...