Missing Authorization Affecting redis package, versions <5:6.0.16-1+deb11u2


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
97.09% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN11-REDIS-2401202
  • published15 Feb 2022
  • disclosed18 Feb 2022

Introduced: 15 Feb 2022

CVE-2022-0543  (opens in a new tab)
CWE-862  (opens in a new tab)

How to fix?

Upgrade Debian:11 redis to version 5:6.0.16-1+deb11u2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream redis package and not the redis package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.

CVSS Scores

version 3.1