It was discovered that Lua did not properly generate code when "_ENV" is constant. An attacker could possibly use this issue to cause a denial of service or execute arbitrary unstrusted lua code. (CVE-2022-28805)
It was discovered that Lua did not properly handle C stack overflows during error handling. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-33099)
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "liblua5.4-0", "binary_version": "5.4.4-1ubuntu0.1~esm1" }, { "binary_name": "liblua5.4-0-dbg", "binary_version": "5.4.4-1ubuntu0.1~esm1" }, { "binary_name": "liblua5.4-dev", "binary_version": "5.4.4-1ubuntu0.1~esm1" }, { "binary_name": "lua5.4", "binary_version": "5.4.4-1ubuntu0.1~esm1" } ] }