CVE-2022-0543
Scores
EPSS Score
0.9438
CVSS
3.x 10.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
All CVSS Scores
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
Description
Было обнаружено, что redis, постоянная база данных типа «ключ-значение», из-за проблемы с упаковкой подвержена (специфичному для Debian) выходу из песочницы Lua, что может привести к удаленному выполнению кода.
Sources
CWEs
Related Vulnerabilities
Exploits
Reference Links
Vulnerable Software
Type: Configuration
Product: redis
Operating System: debian
{
"fixed": "5:6.0.16-2"
}
Source: debian
Type: Configuration
Product: redis
Operating System: debian stretch 9
{
"unaffected": true
}
Source: debian
Type: Configuration
Product: redis
Operating System: ubuntu bionic 18.04
{
"unaffected": true
}
Source: ubuntu
Type: Configuration
Product: redis
Operating System: ubuntu focal 20.04
{
"fixed": "5:5.0.7-2ubuntu0.1"
}
Source: ubuntu
Type: Configuration
Product: redis
Operating System: ubuntu impish 21.10
{
"fixed": "5:6.0.15-1ubuntu0.1"
}
Source: ubuntu
Type: Configuration
Product: redis
Operating System: ubuntu trusty 14.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Product: redis
Operating System: ubuntu xenial 16.04
{
"unfixed": true
}
Source: ubuntu
Type: Configuration
Vendor: redis
Product: redis
Operating System: * * *
{
"children": [
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:a:redis:redis:-:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"operator": "OR"
},
{
"cpe_match": [
{
"cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:-:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
},
{
"cpe23uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
Source: nvd