https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Bug ID: 2064772 Summary: CVE-2021-44964 lua: use after free allows Sandbox Escape Product: Security Response Hardware: All OS: Linux Status: NEW Component: vulnerability Keywords: Security Severity: high Priority: high Assignee: security-response-team@redhat.com Reporter: pdelbell@redhat.com CC: 4le@live.com, caswilli@redhat.com, csutherl@redhat.com, drjohnson1@gmail.com, fedora@famillecollet.com, fjansen@redhat.com, gzaronik@redhat.com, hdegoede@redhat.com, jburrell@redhat.com, jclere@redhat.com, jwon@redhat.com, kaycoth@redhat.com, krathod@redhat.com, lua-packagers-sig@lists.fedoraproject.org, mhroncok@redhat.com, michel@michel-slm.name, moceap@hotmail.com, mschmidt@redhat.com, mturk@redhat.com, packaging-team-maint@redhat.com, pjindal@redhat.com, rob.myers@gtri.gatech.edu, spotrh@gmail.com, szappis@redhat.com Target Milestone: --- Classification: Other
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44964 https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerabili... http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44964 http://lua-users.org/lists/lua-l/2021-12/msg00007.html http://lua-users.org/lists/lua-l/2021-12/msg00015.html http://lua-users.org/lists/lua-l/2021-12/msg00030.html http://lua-users.org/lists/lua-l/2021-11/msg00186.html