summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-extended/redis/redis_7.2.12.bb
diff options
context:
space:
mode:
authorDeepak Rathore <deeratho@cisco.com>2025-12-04 09:25:10 -0800
committerKhem Raj <raj.khem@gmail.com>2025-12-05 10:13:23 -0800
commit7675392aa7c1bf27b8993d08936bc4bc84d1508d (patch)
tree02620f6250d6b15d4a7bdb25acc4331ac41e64d9 /meta-oe/recipes-extended/redis/redis_7.2.12.bb
parent331126a6d0a48ebcf12069df554b3abacaeb512a (diff)
downloadmeta-openembedded-7675392aa7c1bf27b8993d08936bc4bc84d1508d.tar.gz
redis: Refine CVE-2022-0543 status description
Refine the CVE_STATUS description for CVE-2022-0543 to provide a more precise explanation of this Debian-specific vulnerability. The vulnerability originates from Debian's packaging methodology, which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack), enabling Lua sandbox escape. Upstream Redis builds, including those built by Yocto/OpenEmbedded, utilize embedded Lua from the deps/ directory and are therefore not affected by this issue. It is also fixed in Debian with this commit: https://salsa.debian.org/lamby/pkg-redis/-/commit/c7fd665150dc4769402cae97d1152b3c6e4366f0 References: - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce - https://nvd.nist.gov/vuln/detail/CVE-2022-0543 Signed-off-by: Deepak Rathore <deeratho@cisco.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-oe/recipes-extended/redis/redis_7.2.12.bb')
-rw-r--r--meta-oe/recipes-extended/redis/redis_7.2.12.bb7
1 files changed, 6 insertions, 1 deletions
diff --git a/meta-oe/recipes-extended/redis/redis_7.2.12.bb b/meta-oe/recipes-extended/redis/redis_7.2.12.bb
index 6527fb6996..0989ed5e8d 100644
--- a/meta-oe/recipes-extended/redis/redis_7.2.12.bb
+++ b/meta-oe/recipes-extended/redis/redis_7.2.12.bb
@@ -78,4 +78,9 @@ INITSCRIPT_PARAMS = "defaults 87"
78SYSTEMD_SERVICE:${PN} = "redis.service" 78SYSTEMD_SERVICE:${PN} = "redis.service"
79 79
80CVE_STATUS[CVE-2022-3734] = "not-applicable-platform: CVE only applies for Windows." 80CVE_STATUS[CVE-2022-3734] = "not-applicable-platform: CVE only applies for Windows."
81CVE_STATUS[CVE-2022-0543] = "not-applicable-platform: Debian-specific CVE" 81# The vulnerability originates from Debian's packaging methodology,
82# which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack),
83# enabling Lua sandbox escape. Upstream Redis builds, including
84# those built by Yocto/OpenEmbedded, utilize embedded Lua from the
85# deps/ directory and are therefore not affected by this issue.
86CVE_STATUS[CVE-2022-0543] = "not-applicable-config: Debian-specific packaging issue caused by loading system-wide Lua libraries; upstream builds use embedded Lua and are not affected"