It was discovered that redis, a persistent key-value database, could execute insecure Lua bytecode by way of the EVAL command. This could allow remote attackers to break out of the Lua sandbox and execute arbitrary code. For the stable distribution (jessie), this problem has been fixed in version 2:2.8.17-1+deb8u1. For the testing distribution (stretch), this problem will be fixed in version 2:3.0.2-1. For the unstable distribution (sid), this problem has been fixed in version 2:3.0.2-1. We recommend that you upgrade your redis packages.
It was discovered that redis, a persistent key-value database, could execute insecure Lua bytecode by way of the EVAL command. This could allow remote attackers to break out of the Lua sandbox and execute arbitrary code.
For the stable distribution (jessie), this problem has been fixed in version 2:2.8.17-1+deb8u1.
For the testing distribution (stretch), this problem will be fixed in version 2:3.0.2-1.
For the unstable distribution (sid), this problem has been fixed in version 2:3.0.2-1.
We recommend that you upgrade your redis packages.