diff options
| author | Deepak Rathore <deeratho@cisco.com> | 2025-12-04 09:25:10 -0800 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2025-12-05 10:13:23 -0800 |
| commit | 7675392aa7c1bf27b8993d08936bc4bc84d1508d (patch) | |
| tree | 02620f6250d6b15d4a7bdb25acc4331ac41e64d9 /meta-oe/recipes-extended/redis/redis_7.2.12.bb | |
| parent | 331126a6d0a48ebcf12069df554b3abacaeb512a (diff) | |
| download | meta-openembedded-7675392aa7c1bf27b8993d08936bc4bc84d1508d.tar.gz | |
redis: Refine CVE-2022-0543 status description
Refine the CVE_STATUS description for CVE-2022-0543 to provide
a more precise explanation of this Debian-specific vulnerability.
The vulnerability originates from Debian's packaging methodology,
which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack),
enabling Lua sandbox escape. Upstream Redis builds, including
those built by Yocto/OpenEmbedded, utilize embedded Lua from the
deps/ directory and are therefore not affected by this issue.
It is also fixed in Debian with this commit:
https://salsa.debian.org/lamby/pkg-redis/-/commit/c7fd665150dc4769402cae97d1152b3c6e4366f0
References:
- https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce
- https://nvd.nist.gov/vuln/detail/CVE-2022-0543
Signed-off-by: Deepak Rathore <deeratho@cisco.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-oe/recipes-extended/redis/redis_7.2.12.bb')
| -rw-r--r-- | meta-oe/recipes-extended/redis/redis_7.2.12.bb | 7 |
1 files changed, 6 insertions, 1 deletions
diff --git a/meta-oe/recipes-extended/redis/redis_7.2.12.bb b/meta-oe/recipes-extended/redis/redis_7.2.12.bb index 6527fb6996..0989ed5e8d 100644 --- a/meta-oe/recipes-extended/redis/redis_7.2.12.bb +++ b/meta-oe/recipes-extended/redis/redis_7.2.12.bb | |||
| @@ -78,4 +78,9 @@ INITSCRIPT_PARAMS = "defaults 87" | |||
| 78 | SYSTEMD_SERVICE:${PN} = "redis.service" | 78 | SYSTEMD_SERVICE:${PN} = "redis.service" |
| 79 | 79 | ||
| 80 | CVE_STATUS[CVE-2022-3734] = "not-applicable-platform: CVE only applies for Windows." | 80 | CVE_STATUS[CVE-2022-3734] = "not-applicable-platform: CVE only applies for Windows." |
| 81 | CVE_STATUS[CVE-2022-0543] = "not-applicable-platform: Debian-specific CVE" | 81 | # The vulnerability originates from Debian's packaging methodology, |
| 82 | # which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack), | ||
| 83 | # enabling Lua sandbox escape. Upstream Redis builds, including | ||
| 84 | # those built by Yocto/OpenEmbedded, utilize embedded Lua from the | ||
| 85 | # deps/ directory and are therefore not affected by this issue. | ||
| 86 | CVE_STATUS[CVE-2022-0543] = "not-applicable-config: Debian-specific packaging issue caused by loading system-wide Lua libraries; upstream builds use embedded Lua and are not affected" | ||
