Skip to content

Conversation

@npt-1707
Copy link

Summary

Our tool detected a potential vulnerability in finderrfunc() in third-party/luajit/src/lj_err.c which was cloned from LuaJIT/LuaJIT@53f82e6 but did not receive the security patch. The original issue was reported and fixed under CVE-2020-15890.

Proposed Fix

Apply the same patch as the one in LuaJIT/LuaJIT to eliminate the vulnerability.

Reference

https://nvd.nist.gov/vuln/detail/CVE-2020-15890
LuaJIT/LuaJIT@53f82e6

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR applies a critical security patch to fix CVE-2020-15890 in the LuaJIT error handling code. The vulnerability existed in the finderrfunc() function where the cframe pointer (cf) was not being advanced in the FRAME_CP case, potentially causing pointer desynchronization during stack traversal.

  • Adds missing cf = cframe_prev(cf); call in the FRAME_CP case of finderrfunc()
  • Aligns the FRAME_CP case behavior with FRAME_C and FRAME_CONT cases
  • Directly applies the upstream LuaJIT security patch from commit 53f82e6e2e858a0a62fd1a2ff47e9866693382e6

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Copilot reviewed 1 out of 1 changed files in this pull request and generated no new comments.


💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant