Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-45985

Опубликовано: 10 апр. 2023
Источник: redhat
CVSS3: 7.5

Описание

In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

A heap-based buffer overflow issue was found in Lua Interpreter. The vulnerability can be exploited when an erroneous finalizer calls during a tail call with an invalid stack, triggering an out-of-bounds read, leading to a crash or a denial of service.

Отчет

The bug exists in Lua Interpreter since v5.4.3 and fixed in v5.4.4. RHEL-6, 7, 8 ships Lua-v5.3.4 and prior versions, which does not contains the vulnerable function. And RHEL-9 already ships Lua-v5.4.4 and above, which contains the fix. Hence, none of the Lua versions shipped with Red Hat Enterprise Linux are affected.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6luaNot affected
Red Hat Enterprise Linux 7luaNot affected
Red Hat Enterprise Linux 8libreoffice:flatpak/luaNot affected
Red Hat Enterprise Linux 8luaNot affected
Red Hat Enterprise Linux 9luaNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-126

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 лет назад

In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

CVSS3: 7.5
nvd
около 2 лет назад

In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

CVSS3: 5.5
msrc
5 месяцев назад

Mitre: CVE-2021-45985 Erroneous finalizer call in Lua leads to a heap-based buffer over-read

CVSS3: 7.5
debian
около 2 лет назад

In Lua 5.4.3, an erroneous finalizer called during a tail call leads t ...

CVSS3: 7.5
github
около 2 лет назад

In Lua 5.4.3, an erroneous finalizer called during a tail call leads to a heap-based buffer over-read.

7.5 High

CVSS3