Redis’ recent Lua-scripting vulnerabilities have once again put the spotlight on supply-chain visibility: Microsoft’s MSRC entry notes that Azure Linux includes the affected open‑source component and is therefore potentially affected, but that wording is a product‑scoped attestation rather than a categorical statement that no other Microsoft product could carry the same code.
Redis is a widely used, in‑memory data store that exposes an embedded Lua interpreter to let clients run small server‑side scripts atomically. Multiple CVEs disclosed in October 2025 describe paths where a malicious or malformed Lua script can either escape the interpreter’s protections or manipulate the interpreter state so that code executes with the privileges of another user. The vulnerability tracked as CVE‑2025‑46818 describes a Lua scripting weakness that allows an authenticated user to execute a specially crafted script in the context of a different Redis user; the issue was fixed in Redis 8.2.2. A related and more severe Lua use‑after‑free (CVE‑2025‑49844) was published publicly at the same time and documented as allowing escape from the Lua sandbox up to remote code execution in certain circumstances; Redis and major cloud vendors urged immediate patching or disabling of scripting where feasible. The Redis project and downstream vendors published fixes and mitigations—including the canonical release that contains the patch. Microsoft’s MSRC acknowledged the library’s presence in the Azure Linux distribution and, separately, published a plan to deliver machine‑readable CSAF/VEX attestations beginning with Azure Linux so customers can automate inventory/triage decisions. The company’s public messaging says it will update CVE/VEX mappings if additional Microsoft products are identified as carriers of the same upstream component.
Operational consequences:
The immediate operational recommendation is straightforward: treat Azure Linux as in‑scope and remediate per Microsoft’s guidance; treat every other Microsoft image or kernel you run as unknown until you have confirmed its status via the VEX/CSAF feed, Microsoft advisories, or your own verification. For Redis in particular, upgrade to the fixed versions or apply strict ACLs and network isolation until patches are in place. Microsoft’s VEX/CSAF program reduces ambiguity for the attested product (Azure Linux) but the broader operational work—inventorying, verifying, and patching every distinct artifact—remains the customer’s responsibility.
Source: MSRC Security Update Guide - Microsoft Security Response Center
Background / Overview
Redis is a widely used, in‑memory data store that exposes an embedded Lua interpreter to let clients run small server‑side scripts atomically. Multiple CVEs disclosed in October 2025 describe paths where a malicious or malformed Lua script can either escape the interpreter’s protections or manipulate the interpreter state so that code executes with the privileges of another user. The vulnerability tracked as CVE‑2025‑46818 describes a Lua scripting weakness that allows an authenticated user to execute a specially crafted script in the context of a different Redis user; the issue was fixed in Redis 8.2.2. A related and more severe Lua use‑after‑free (CVE‑2025‑49844) was published publicly at the same time and documented as allowing escape from the Lua sandbox up to remote code execution in certain circumstances; Redis and major cloud vendors urged immediate patching or disabling of scripting where feasible. The Redis project and downstream vendors published fixes and mitigations—including the canonical release that contains the patch. Microsoft’s MSRC acknowledged the library’s presence in the Azure Linux distribution and, separately, published a plan to deliver machine‑readable CSAF/VEX attestations beginning with Azure Linux so customers can automate inventory/triage decisions. The company’s public messaging says it will update CVE/VEX mappings if additional Microsoft products are identified as carriers of the same upstream component. What Microsoft actually said — and what that phrasing means
Microsoft’s public wording for these third‑party CVEs follows a deliberate, phased approach:- Microsoft has started publishing machine‑readable CSAF/VEX attestations and began with the Azure Linux distribution.
- For the specific CVE entry in question, MSRC’s short advisory text states: “Azure Linux includes this open‑source library and is therefore potentially affected by this vulnerability.” That sentence is an authoritative, product‑level attestation for Azure Linux — Microsoft checked that product’s build artifacts and found the upstream component.
- Microsoft also explicitly says it will update the VEX/CSAF/CVE records if other Microsoft products are later identified to include the same component. That is a procedural commitment, not an exclusionary guarantee.
Short answer to the user’s question
No — Azure Linux is not necessarily the only Microsoft product that includes the affected open‑source library. It is the only Microsoft product Microsoft has publicly attested (via the initial VEX/CSAF rollout) to include the implicated component at the time of the advisory. Absence of a published Microsoft attestation for other products is absence of evidence, not proof of absence. Until Microsoft’s inventory (or your own artifact checks) confirms whether other Microsoft artifacts include that library, those artifacts remain unverified and should be treated as potentially in‑scope.Why this distinction matters operationally
The kernel and other low‑level libraries are build‑time artifacts: whether a given Microsoft image or product contains a vulnerable component depends on the exact source tree, version, and configuration used to build that artifact. Microsoft ships multiple kernel artefacts and Linux‑adjacent images (for example, Azure Linux/CBL‑Mariner lineage images, linux‑azure kernels for some VM SKUs, WSL2 kernel releases, Marketplace images, AKS node images, and partner appliances). Each of these is a distinct binary and must be inventoried and validated individually. Microsoft’s VEX program is product‑by‑product; starting with Azure Linux is pragmatic but not exhaustive.Operational consequences:
- If you run Azure Linux, treat Microsoft’s attestation as a definitive “in‑scope” signal and follow Microsoft’s recommended remediations immediately.
- If you run other Microsoft images (for example, WSL2 kernels, Marketplace images, AKS node OS images, or the linux‑azure kernel), you must verify the artifact (kernel version, module list, package content) rather than rely on the absence of an MSRC attestation.
Cross‑validated technical facts (what we verified)
- The Redis Lua scripting issues (CVE‑2025‑46818 and allied CVEs) affect Redis versions shipping Lua scripting support; upstream fixes are included in Redis 8.2.2 and the fixed versions in other supported branches. This is confirmed by the NVD record and Redis project release notes.
- The canonical upstream fix changed how user scripts interact with global tables and tightened the interpreter’s state handling so a script cannot persistently change global runtime objects that would later execute in another user’s context. The Redis security advisory and GitHub security advisory summarize the technical remediation.
- Microsoft’s public VEX/CSAF rollout started with Azure Linux; MSRC published a blog explaining the phased approach and why attestations begin with that product family. Microsoft stated it will expand attestations to additional artifacts over time.
- Managed services—Azure Cache for Redis—are operated by Microsoft and Microsoft staff have confirmed that managed instances may be affected depending on the service’s deployed Redis build, and that fixes are applied via scheduled maintenance windows; Microsoft guidance recommends network locking and ACLs as mitigations until the provider has patched instances.
Practical verification checklist (artifact‑level triage)
Any organization that runs Microsoft‑supplied images or runs Redis (or Redis‑based managed services) should follow this prioritized verification playbook.- Inventory first (high priority)
- Identify all hosts and services running Redis (including containers, VMs, and PaaS). Use asset discovery, configuration management databases, or cloud provider inventory APIs to enumerate instances.
- Identify all Microsoft images and kernels in use: Azure VM images, AKS node OS SKUs, Marketplace appliances, Windows Subsystem for Linux (WSL) kernel builds, and any Microsoft‑distributed container base images.
- Check Redis versions (quick functional checks)
- On each Redis instance run: redis-cli INFO SERVER | grep redis_version. Any version older than the fixed releases (patched lines) should be triaged for upgrade.
- Audit which accounts can run scripting commands: log or inspect whether EVAL, EVALSHA, SCRIPT LOAD, SCRIPT EXISTS, and SCRIPT FLUSH are being invoked.
- For Microsoft‑supplied Linux artifacts
- Query kernel versions and build provenance: uname -a; check packaged kernel version strings; examine /proc/config.gz or distribution package changelogs to map upstream commit ranges.
- Inspect modules and drivers present (lsmod; modinfo) where the CVE concerns kernel modules or drivers: presence of a particular module or driver file often suffices to indicate exposure.
- If you run Azure Cache for Redis (managed)
- Check the Azure service advisories and the Azure Cache for Redis health/maintenance messages. Microsoft’s support guidance confirms the service may be affected and that Microsoft schedules the patching for managed instances—follow the provider guidance and restrict network access in the interim.
- If you cannot patch immediately
- Apply ACLs to prevent untrusted users from running scripts (deny EVAL/EVALSHA and SCRIPT families for low‑privilege accounts).
- Restrict network access to Redis instances: private subnets, firewall rules, or Private Endpoint for Azure managed services.
- Rotate credentials / keys for managed caches if compromise is suspected.
Remediation guidance and timelines
- The authoritative remediation is to upgrade Redis to a fixed release (Redis 8.2.2 or patched vendor packages for the fixed branches). Test the upgraded stack under staging because the Lua semantics change can affect scripts that relied on the old global mutability behavior.
- For Microsoft managed offerings (Azure Cache for Redis), administrators should:
- Monitor Microsoft’s Azure service advisories and Microsoft Q&A posts for the exact schedule of platform patching.
- Use network isolation (Private Endpoint, firewall rules) and rotate access keys while waiting for a provider patch. Microsoft staff guidance recommends these mitigations.
- If the product is a Microsoft image that Microsoft has attested (Azure Linux), treat the MSRC VEX/CSAF attestation as the canonical signal: apply the vendor’s published patch or recommended remediation immediately for those instances.
Critical analysis: strengths of Microsoft’s approach — and the operational risk
Strengths- Machine‑readable VEX/CSAF output is a major operational improvement. Publishing an authoritative, machine‑friendly attestation for a product (Azure Linux) lets security teams automate triage, reduces false positives, and speeds remediation decisions. Microsoft’s blog makes this intent explicit.
- Phased rollout reduces errors. Starting with a single product family (Azure Linux) lets Microsoft validate the pipeline, reduce incorrect attestations, and fine‑tune the inventory process before scaling to dozens of other product artifacts.
- Phasing creates a ‘verification gap’. While Azure Linux is now an attested hit, dozens of other Microsoft artifacts remain unattested and therefore unknown. Customers who assume “no attestation = not affected” will be exposed if they run un‑attested artifacts that actually include the vulnerable component. Multiple independent analyses warn operators to not infer safety from absence of an attestation.
- Complex build pipelines make universal claims hard. Kernel/driver presence depends on the exact configuration and commits used at build time; two Microsoft‑branded kernels can differ substantially. Proper verification therefore requires artifact inspection, not headline reading.
- Managed services complicate operator assumptions. Services such as Azure Cache for Redis are patched by the provider on their schedule; customers must combine provider advisories with their own monitoring and network controls. Microsoft guidance confirms the service may be affected and recommended mitigations while rolling fixes.
Risk scenarios and what to prioritize
- High priority: Any multi‑tenant Redis instance, public‑facing caches, or Redis instances that accept scripts from low‑privilege clients should be patched or have scripting disabled immediately. Attackers commonly exploit misconfiguration (instances without authentication) to combine CVEs into high‑impact incidents.
- Medium priority: Microsoft images and kernels that you cannot quickly inventory—WSL2 kernels used on developer workstations, Marketplace distributions that may have embedded components, or third‑party appliances distributed through Azure Marketplace. Treat these as unknown and inventory them.
- Lower priority: Isolated single‑user Redis instances with no remote access and strict controls—but still verify version and scripting usage before assuming immunity.
Recommended checklist for security teams (actionable)
- Pull a full asset inventory for Redis and Microsoft images in use. (Use cloud provider APIs, CMDB, and endpoint inventories.
- For every Redis instance:
- Check redis_version.
- Audit whether EVAL/EVALSHA/SCRIPT commands are used.
- If patching is delayed, apply ACL denials for scripting for non‑trusted users.
- For every Microsoft kernel/image you run:
- Determine the exact kernel/package version and map that to upstream commits or distribution advisories.
- If the image is Azure Linux and MSRC attested it, apply Microsoft’s patch guidance immediately.
- For Azure Cache for Redis customers:
- Follow Azure’s advisories and implement network isolation and key rotation while Microsoft applies platform fixes.
- Automate: ingest Microsoft’s CSAF/VEX feed once available and map it into your vulnerability management and patch automation workflows. That machine‑readable feed is specifically designed to reduce triage time for attested products.
Closing analysis and final verdict
Microsoft’s published line — that Azure Linux includes the open‑source library and is therefore potentially affected — is accurate, actionable, and represents an important step forward in vendor transparency. The company’s new CSAF/VEX attestations give security teams a machine‑readable, authoritative signal they can automate against for Azure Linux. However, that phrasing should not be misread as a universal guarantee that no other Microsoft product includes the same vulnerable component. The practical reality is that several other Microsoft artifacts (WSL2 kernels, linux‑azure builds, Marketplace images, managed services, and partner appliances) are plausible carriers depending on build configuration and upstream patch levels. Until Microsoft publishes attestations for those artifacts or you perform artifact‑level validation, they remain unverified and potentially affected.The immediate operational recommendation is straightforward: treat Azure Linux as in‑scope and remediate per Microsoft’s guidance; treat every other Microsoft image or kernel you run as unknown until you have confirmed its status via the VEX/CSAF feed, Microsoft advisories, or your own verification. For Redis in particular, upgrade to the fixed versions or apply strict ACLs and network isolation until patches are in place. Microsoft’s VEX/CSAF program reduces ambiguity for the attested product (Azure Linux) but the broader operational work—inventorying, verifying, and patching every distinct artifact—remains the customer’s responsibility.
Source: MSRC Security Update Guide - Microsoft Security Response Center