Lua security update to fix heap buffer overread vulnerability
Reporter | Title | Published | Views | Family All 51 |
---|---|---|---|---|
![]() | Denial Of Service (DoS) | 2 May 202212:21 | – | veracode |
![]() | CVE-2022-28805 | 8 Apr 202200:00 | – | cvelist |
![]() | Critical Photon OS Security Update - PHSA-2022-0386 | 22 Apr 202200:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2022-0173 | 21 Apr 202200:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2022-3.0-0386 | 22 Apr 202200:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2022-4.0-0173 | 22 Apr 202200:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2023-5.0-0036 | 22 Jun 202300:00 | – | photon |
![]() | Critical Photon OS Security Update - PHSA-2023-3.0-0601 | 20 Jun 202300:00 | – | photon |
![]() | CVE-2022-28805 | 8 Apr 202206:15 | – | nvd |
![]() | Security Bulletin: IBM App Connect Enterprise Certified Container Dashboard operands are vulnerable to arbitrary code execution due to [CVE-2022-28805] | 25 Jul 202313:48 | – | ibm |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
almalinux | 9 | i686 | lua | 5.4.4-3.el9 | lua-5.4.4-3.el9.i686.rpm |
almalinux | 9 | ppc64le | lua | 5.4.4-3.el9 | lua-5.4.4-3.el9.ppc64le.rpm |
almalinux | 9 | aarch64 | lua | 5.4.4-3.el9 | lua-5.4.4-3.el9.aarch64.rpm |
almalinux | 9 | s390x | lua | 5.4.4-3.el9 | lua-5.4.4-3.el9.s390x.rpm |
almalinux | 9 | x86_64 | lua | 5.4.4-3.el9 | lua-5.4.4-3.el9.x86_64.rpm |
almalinux | 9 | i686 | lua-libs | 5.4.4-3.el9 | lua-libs-5.4.4-3.el9.i686.rpm |
almalinux | 9 | x86_64 | lua-libs | 5.4.4-3.el9 | lua-libs-5.4.4-3.el9.x86_64.rpm |
almalinux | 9 | ppc64le | lua-libs | 5.4.4-3.el9 | lua-libs-5.4.4-3.el9.ppc64le.rpm |
almalinux | 9 | s390x | lua-libs | 5.4.4-3.el9 | lua-libs-5.4.4-3.el9.s390x.rpm |
almalinux | 9 | aarch64 | lua-libs | 5.4.4-3.el9 | lua-libs-5.4.4-3.el9.aarch64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo