Name | CVE-2021-44964 |
Description | Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
lua5.4 (PTS) | bullseye | 5.4.2-2 | vulnerable |
bookworm | 5.4.4-3+deb12u1 | fixed | |
sid, trixie | 5.4.6-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
lua5.4 | source | (unstable) | 5.4.4-1 |
[bullseye] - lua5.4 <no-dsa> (Minor issue, GC/finalizer changes intrusive to backport)
http://lua-users.org/lists/lua-l/2021-11/msg00186.html
http://lua-users.org/lists/lua-l/2021-12/msg00007.html
http://lua-users.org/lists/lua-l/2021-12/msg00015.html
http://lua-users.org/lists/lua-l/2021-12/msg00030.html
https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability
https://github.com/lua/lua/commit/0bfc572e51d9035a615ef6e9523f736c9ffa8e57
https://github.com/lua/lua/commit/066e0f93c4901e601d93e31fb700f8f66f95feb8
https://github.com/lua/lua/commit/cf613cdc6fa367257fc61c256f63d917350858b5
https://github.com/lua/lua/commit/86ec152433baf8daf39f03a59c6842cbe33a179d
https://github.com/lua/lua/commit/597a53bbc681089d85b082b46c2e2428dec43b86