First published: Mon Feb 14 2022(Updated: )
Redis is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
Credit: security@debian.org security@debian.org security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/redis | <=5:5.0.14-1+deb10u1<=5:5.0.3-4<=5:6.0.15-1 | 5:6.0.16-1+deb11u2 5:5.0.14-1+deb10u2 5:6.0.16-2 5:7.0~rc2-2 |
debian/redis | 5:5.0.14-1+deb10u2 5:5.0.14-1+deb10u5 5:6.0.16-1+deb11u2 5:7.0.11-1 5:7.0.14-1 | |
Redis Debian-specific Redis Servers | ||
All of | ||
Redis | ||
Any of | ||
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =21.10 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Redis | ||
Canonical Ubuntu Linux | =20.04 | |
Canonical Ubuntu Linux | =21.10 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Redis Server vulnerability is CVE-2022-0543.
CVE-2022-0543 has a severity level of critical.
The affected software for CVE-2022-0543 includes Redis Debian-specific Redis Servers and Redis.
Remote code execution can be achieved with CVE-2022-0543 through a Debian-specific Lua sandbox escape.
To fix the vulnerability CVE-2022-0543, update the Redis server to version 5:6.0.16-1+deb11u2, 5:5.0.14-1+deb10u2, 5:6.0.16-2, or 5:7.0~rc2-2.