LuaJIT through 2.1.0-beta3 has an out-of-bounds read in lj_err_run in lj_err.c. Reference: https://github.com/LuaJIT/LuaJIT/issues/603
Created luajit tracking bugs for this issue: Affects: epel-all [bug 1870308] Affects: fedora-all [bug 1870309] Affects: openstack-rdo [bug 1870307]
External References: https://github.com/LuaJIT/LuaJIT/issues/603
Upstream fix: https://github.com/LuaJIT/LuaJIT/commit/12ab596997b9cb27846a5b254d11230c3f9c50c8 and https://github.com/LuaJIT/LuaJIT/commit/e296f56b825c688c3530a981dc6b495d972f3d01
Statement: OpenShift ServiceMesh (OSSM) does package a vulnerable version of luajit. However, a potential attacker would require enough privileges to be able to influence the envoy configuration to modify the lua rules in order to cause the out-of-bounds (OOB) read. Hence for OSSM the impact is low.
Closing old flaw bug - asfaik this hasn't been fixes so closing wontfix