Bugzilla – Bug 934048
VUL-0: CVE-2015-4335: redis: Lua sandbox escape and arbitrary code execution
Last modified: 2016-03-21 16:15:33 UTC
http://seclists.org/oss-sec/2015/q2/646 opensuse only redis 3.0.2 and 2.8.21 have been released https://groups.google.com/forum/#!msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/ https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411 is the essence of the request that the Redis upstream vendor believes that loading Lua bytecode was, by itself, inherently an implementation mistake in Redis, and is now fixed by the https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411 change? Yes, that was the idea. Use CVE-2015-4335.
bugbot adjusting priority
darix, do we need to fix it for 13.1 and 13.2? can you perhaps set yourself as opensuse maintainer too?
submitted
This is an autogenerated message for OBS integration: This bug (934048) was mentioned in https://build.opensuse.org/request/show/333495 13.2+13.1 / redis
openSUSE-SU-2015:1687-1: An update that fixes one vulnerability is now available. Category: security (moderate) Bug References: 934048 CVE References: CVE-2015-4335 Sources used: openSUSE 13.2 (src): redis-2.8.22-2.6.1, sssd-1.12.2-3.11.1 openSUSE 13.1 (src): redis-2.8.22-3.6.1
fixed and released.