First published: Thu Oct 13 2022(Updated: )
In Linaro Automated Validation Architecture (LAVA) before 2022.10, there is dynamic code execution in lava_server/lavatable.py. Due to improper input sanitization, an anonymous user can force the lava-server-gunicorn service to execute user-provided code on the server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linaro LAVA | <2022.10 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/lava | <=2019.01-5 | 2019.01-5+deb10u2 2020.12-5+deb11u2 2023.01-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42902 is a vulnerability in Linaro Automated Validation Architecture (LAVA) before 2022.10 that allows an anonymous user to execute user-provided code on the server.
CVE-2022-42902 has a severity rating of 8.8 (high).
Linaro LAVA versions before 2022.10 and Debian Linux versions 10.0, 11.0 are affected by CVE-2022-42902.
To fix CVE-2022-42902, update Linaro LAVA to version 2022.10 or later, and update Debian Linux to the recommended versions: 2019.01-5+deb10u2, 2020.12-5+deb11u2, or 2023.01-2.
You can find more information about CVE-2022-42902 at the following references: [Security Tracker Debian](https://security-tracker.debian.org/tracker/CVE-2022-42902), [Linaro GitLab Merge Request](https://git.lavasoftware.org/lava/lava/-/merge_requests/1834), [Linaro GitLab Commit](https://git.lavasoftware.org/lava/lava/-/commit/e66b74cd6c175ff8826b8f3431740963be228b52?merge_request_iid=1834).