redis is vulnerable to remote code execution. The vulnerability exists because the users are not properly restricted which allows an attacker with access to Redis can inject arbitrary Lua code.
github.com/redis/redis/pull/10651
github.com/redis/redis/releases/tag/6.2.7
github.com/redis/redis/releases/tag/7.0.0
github.com/redis/redis/security/advisories/GHSA-647m-2wmq-qmvq
lists.fedoraproject.org/archives/list/[email protected]/message/J4ZK3675DGHVVDOFLJN7WX6YYH27GPMK/
lists.fedoraproject.org/archives/list/[email protected]/message/VPYKSG7LKUJGVM2P72EHXKVRVRWHLORX/
lists.fedoraproject.org/archives/list/[email protected]/message/WSTPUCAPBRHIFPSCOURR4OYX4E2OISAF/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.14/main.yaml
secdb.alpinelinux.org/v3.15/main.yaml
security.gentoo.org/glsa/202209-17
security.netapp.com/advisory/ntap-20220715-0003/
www.oracle.com/security-alerts/cpujul2022.html