https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Bug ID: 2064772 Summary: CVE-2021-44964 lua: use after free allows Sandbox Escape Product: Security Response Hardware: All OS: Linux Status: NEW Component: vulnerability Keywords: Security Severity: high Priority: high Assignee: security-response-team@redhat.com Reporter: pdelbell@redhat.com CC: 4le@live.com, caswilli@redhat.com, csutherl@redhat.com, drjohnson1@gmail.com, fedora@famillecollet.com, fjansen@redhat.com, gzaronik@redhat.com, hdegoede@redhat.com, jburrell@redhat.com, jclere@redhat.com, jwon@redhat.com, kaycoth@redhat.com, krathod@redhat.com, lua-packagers-sig@lists.fedoraproject.org, mhroncok@redhat.com, michel@michel-slm.name, moceap@hotmail.com, mschmidt@redhat.com, mturk@redhat.com, packaging-team-maint@redhat.com, pjindal@redhat.com, rob.myers@gtri.gatech.edu, spotrh@gmail.com, szappis@redhat.com Target Milestone: --- Classification: Other
Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-44964 https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerabili... http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44964 http://lua-users.org/lists/lua-l/2021-12/msg00007.html http://lua-users.org/lists/lua-l/2021-12/msg00015.html http://lua-users.org/lists/lua-l/2021-12/msg00030.html http://lua-users.org/lists/lua-l/2021-11/msg00186.html
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Patrick Del Bello pdelbell@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |2064775, 2064774
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2064774 [Bug 2064774] CVE-2021-44964 lua: use after free allows Sandbox Escape [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2064775 [Bug 2064775] CVE-2021-44964 compat-lua: lua: use after free allows Sandbox Escape [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
--- Comment #1 from Patrick Del Bello pdelbell@redhat.com --- Created compat-lua tracking bugs for this issue:
Affects: epel-all [bug 2064775]
Created lua tracking bugs for this issue:
Affects: fedora-all [bug 2064774]
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Todd Cullum tcullum@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |2071781, 2071782
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
--- Doc Text *updated* by Todd Cullum tcullum@redhat.com --- There's a flaw in the Lua interpreter by which an attacker who is able to have a malicious script executed by the interpreter could cause a use after free that may result in sandbox escape.
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Todd Cullum tcullum@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Flags| |needinfo?(ffesti@redhat.com | |) CC| |ffesti@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
--- Doc Text *updated* by RaTasha Tillery-Smith rtillery@redhat.com --- A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.
https://bugzilla.redhat.com/show_bug.cgi?id=2064772 Bug 2064772 depends on bug 2064775, which changed state.
Bug 2064775 Summary: CVE-2021-44964 compat-lua: lua: use after free allows Sandbox Escape [epel-all] https://bugzilla.redhat.com/show_bug.cgi?id=2064775
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |NOTABUG
https://bugzilla.redhat.com/show_bug.cgi?id=2064772 Bug 2064772 depends on bug 2064774, which changed state.
Bug 2064774 Summary: CVE-2021-44964 lua: use after free allows Sandbox Escape [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2064774
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |CURRENTRELEASE
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Todd Cullum tcullum@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |2072795
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Florian Festi ffesti@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(ffesti@redhat.com | |) |
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Florian Festi ffesti@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |security-response-team@redh | |at.com Flags| |needinfo?(security-response | |-team@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Product Security DevOps Team prodsec-dev@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(security-response |needinfo?(tcullum@redhat.co |-team@redhat.com) |m) CC| |tcullum@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Todd Cullum tcullum@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Flags|needinfo?(tcullum@redhat.co | |m) |
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Todd Cullum tcullum@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Fixed In Version| |lua 5.4.4
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Ravindra Patil ravpatil@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |ravpatil@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Panu Matilainen pmatilai@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- CC| |pmatilai@redhat.com
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Zack Miele zmiele@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Severity|high |medium Priority|high |medium
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Zack Miele zmiele@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Priority|medium |high Severity|medium |high
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Florian Festi ffesti@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |2165887
Referenced Bugs:
https://bugzilla.redhat.com/show_bug.cgi?id=2165887 [Bug 2165887] CVE-2021-44964 lua: use after free allows Sandbox Escape [rhel-9.1.z]
https://bugzilla.redhat.com/show_bug.cgi?id=2064772 Bug 2064772 depends on bug 2165887, which changed state.
Bug 2165887 Summary: CVE-2021-44964 lua: use after free allows Sandbox Escape [rhel-9.1.z] https://bugzilla.redhat.com/show_bug.cgi?id=2165887
What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |CLOSED Resolution|--- |WONTFIX
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
RHEL Program Management Team pgm-rhel-tools@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Depends On| |2166643
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Mauro Matteo Cascella mcascell@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Severity|medium |high
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
--- Comment #16 from Mauro Matteo Cascella mcascell@redhat.com --- Upstream fix: https://github.com/lua/lua/commit/0bfc572e51d9035a615ef6e9523f736c9ffa8e57
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
--- Comment #18 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Enterprise Linux 9
Via RHSA-2023:0957 https://access.redhat.com/errata/RHSA-2023:0957
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2023:0957
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
--- Comment #19 from errata-xmlrpc errata-xmlrpc@redhat.com --- This issue has been addressed in the following products:
Red Hat Enterprise Linux 9.0 Extended Update Support
Via RHSA-2023:1211 https://access.redhat.com/errata/RHSA-2023:1211
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
errata-xmlrpc errata-xmlrpc@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Link ID| |Red Hat Product Errata | |RHSA-2023:1211
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
--- Comment #20 from Product Security DevOps Team prodsec-dev@redhat.com --- This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):
https://access.redhat.com/security/cve/cve-2021-44964
https://bugzilla.redhat.com/show_bug.cgi?id=2064772
Product Security DevOps Team prodsec-dev@redhat.com changed:
What |Removed |Added ---------------------------------------------------------------------------- Resolution|--- |ERRATA Status|NEW |CLOSED Last Closed| |2023-05-09 15:43:57
lua-packagers-sig@lists.fedoraproject.org