Описание
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | code not present |
| devel | released | 6.0.16-1ubuntu1 |
| esm-apps/bionic | not-affected | code not present |
| esm-apps/focal | released | 5:5.0.7-2ubuntu0.1 |
| esm-apps/xenial | not-affected | code not present |
| esm-infra-legacy/trusty | not-affected | code not present |
| focal | released | 5:5.0.7-2ubuntu0.1 |
| impish | released | 5:6.0.15-1ubuntu0.1 |
| trusty | ignored | end of standard support |
| trusty/esm | not-affected | code not present |
Показывать по
EPSS
10 Critical
CVSS2
10 Critical
CVSS3
Связанные уязвимости
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
It was discovered, that redis, a persistent key-value database, due to ...
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
Уязвимость системы управления базами данных (СУБД) Redis операционных систем Debian GNU/Linux, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
EPSS
10 Critical
CVSS2
10 Critical
CVSS3