Bug 2185579 (CVE-2021-45985)

Summary: CVE-2021-45985 lua: heap-based buffer over-read
Product: [Other] Security Response Reporter: Avinash Hanwate <ahanwate>
Component: vulnerabilityAssignee: Nobody <nobody>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bdettelb, caswilli, dffrench, fjansen, gzaronik, jburrell, jkoehler, kaycoth, mschmidt, ngough, packaging-team-maint, rgodfrey, sthirugn, tmeszaro, vkrizan
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Lua 5.4.4 Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow issue was found in Lua Interpreter. The vulnerability can be exploited when an erroneous finalizer calls during a tail call with an invalid stack, triggering an out-of-bounds read, leading to a crash or a denial of service.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 2185580    

Description Avinash Hanwate 2023-04-10 11:20:07 UTC
In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

https://www.lua.org/bugs.html#5.4.3-11
https://github.com/lua/lua/commit/cf613cdc6fa367257fc61c256f63d917350858b5
http://lua-users.org/lists/lua-l/2021-12/msg00019.html