It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/166885/Redis-Lua-Sandbox-Escape.html | Exploit Third Party Advisory VDB Entry |
https://bugs.debian.org/1005787 | Issue Tracking Patch Third Party Advisory |
https://lists.debian.org/debian-security-announce/2022/msg00048.html | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220331-0004/ | Third Party Advisory |
https://www.debian.org/security/2022/dsa-5081 | Mailing List Third Party Advisory |
https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2022-02-18 20:15
Updated : 2023-09-29 15:55
NVD link : CVE-2022-0543
Mitre link : CVE-2022-0543
CVE.ORG link : CVE-2022-0543
JSON object : View
Products Affected
debian
- debian_linux
redis
- redis
canonical
- ubuntu_linux
CWE
CWE-862
Missing Authorization