mirror of
git://git.openembedded.org/meta-openembedded
synced 2026-01-01 13:58:06 +00:00
redis: Refine CVE-2022-0543 status description
Refine the CVE_STATUS description for CVE-2022-0543 to provide a more precise explanation of this Debian-specific vulnerability. The vulnerability originates from Debian's packaging methodology, which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack), enabling Lua sandbox escape. Upstream Redis builds, including those built by Yocto/OpenEmbedded, utilize embedded Lua from the deps/ directory and are therefore not affected by this issue. It is also fixed in Debian with this commit:c7fd665150References: - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce - https://nvd.nist.gov/vuln/detail/CVE-2022-0543 Signed-off-by: Deepak Rathore <deeratho@cisco.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit7675392aa7) Signed-off-by: Deepak Rathore <deeratho@cisco.com> Signed-off-by: Anuj Mittal <anuj.mittal@oss.qualcomm.com>
This commit is contained in:
parent
9a4ed6f20f
commit
e76bf51a92
|
|
@ -67,4 +67,9 @@ INITSCRIPT_PARAMS = "defaults 87"
|
|||
|
||||
SYSTEMD_SERVICE:${PN} = "redis.service"
|
||||
|
||||
CVE_STATUS[CVE-2022-0543] = "not-applicable-config: the vulnerability is not present in upstream, only in Debian-packaged versions"
|
||||
# The vulnerability originates from Debian's packaging methodology,
|
||||
# which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack),
|
||||
# enabling Lua sandbox escape. Upstream Redis builds, including
|
||||
# those built by Yocto/OpenEmbedded, utilize embedded Lua from the
|
||||
# deps/ directory and are therefore not affected by this issue.
|
||||
CVE_STATUS[CVE-2022-0543] = "not-applicable-config: Debian-specific packaging issue caused by loading system-wide Lua libraries; upstream builds use embedded Lua and are not affected"
|
||||
|
|
|
|||
|
|
@ -70,5 +70,10 @@ INITSCRIPT_PARAMS = "defaults 87"
|
|||
SYSTEMD_SERVICE:${PN} = "redis.service"
|
||||
|
||||
CVE_STATUS[CVE-2022-3734] = "not-applicable-platform: CVE only applies for Windows."
|
||||
CVE_STATUS[CVE-2022-0543] = "not-applicable-config: the vulnerability is not present in upstream, only in Debian-packaged versions"
|
||||
# The vulnerability originates from Debian's packaging methodology,
|
||||
# which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack),
|
||||
# enabling Lua sandbox escape. Upstream Redis builds, including
|
||||
# those built by Yocto/OpenEmbedded, utilize embedded Lua from the
|
||||
# deps/ directory and are therefore not affected by this issue.
|
||||
CVE_STATUS[CVE-2022-0543] = "not-applicable-config: Debian-specific packaging issue caused by loading system-wide Lua libraries; upstream builds use embedded Lua and are not affected"
|
||||
CVE_STATUS[CVE-2025-27151] = "fixed-version: the used version(7.2.12) contains the fix"
|
||||
|
|
|
|||
Loading…
Reference in New Issue
Block a user