Vulnerability Description
LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.
CVSS Score
9.1
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Luajit | Luajit | <= 2.1.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/pwnhacker0x18/423b4292f301ab274b42d5ed6e0b87d8Third Party Advisory
- https://github.com/LuaJIT/LuaJIT/commit/defe61a56751a0db5f00ff3ab7b8f45436ba74c8Patch
- https://github.com/LuaJIT/LuaJIT/issues/1152ExploitIssue Tracking
- https://github.com/openresty/luajit2/commit/defe61a56751a0db5f00ff3ab7b8f45436ba
- https://lists.debian.org/debian-lts-announce/2025/08/msg00022.html
- https://github.com/LuaJIT/LuaJIT/issues/1152ExploitIssue Tracking
FAQ
What is CVE-2024-25178?
CVE-2024-25178 is a vulnerability with a CVSS score of 9.1 (CRITICAL). LuaJIT through 2.1 and OpenRusty luajit2 before v2.1-20240314 have an out-of-bounds read in the stack-overflow handler in lj_state.c.
How severe is CVE-2024-25178?
CVE-2024-25178 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-25178?
Check the references section above for vendor advisories and patch information. Affected products include: Luajit Luajit.