Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
References
Link | Resource |
---|---|
https://github.com/redis/redis/pull/10651 | Exploit Third Party Advisory |
https://github.com/redis/redis/releases/tag/6.2.7 | Release Notes Third Party Advisory |
https://github.com/redis/redis/releases/tag/7.0.0 | Release Notes Third Party Advisory |
https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J4ZK3675DGHVVDOFLJN7WX6YYH27GPMK/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VPYKSG7LKUJGVM2P72EHXKVRVRWHLORX/ | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WSTPUCAPBRHIFPSCOURR4OYX4E2OISAF/ | |
https://security.gentoo.org/glsa/202209-17 | Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220715-0003/ | Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2022.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Oct 2022, 15:26
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:* cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:* cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:* |
|
References |
|
|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20220715-0003/ - Third Party Advisory | |
References | (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory |
25 Jul 2022, 18:22
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Jul 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
09 May 2022, 17:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redis:redis:7.0:rc2:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:* cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* cpe:2.3:a:redis:redis:7.0:rc1:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* cpe:2.3:a:redis:redis:7.0:rc3:*:*:*:*:*:* |
|
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSTPUCAPBRHIFPSCOURR4OYX4E2OISAF/ - Mailing List, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4ZK3675DGHVVDOFLJN7WX6YYH27GPMK/ - Mailing List, Third Party Advisory | |
References | (MISC) https://github.com/redis/redis/releases/tag/7.0.0 - Release Notes, Third Party Advisory | |
References | (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VPYKSG7LKUJGVM2P72EHXKVRVRWHLORX/ - Mailing List, Third Party Advisory | |
References | (MISC) https://github.com/redis/redis/releases/tag/6.2.7 - Release Notes, Third Party Advisory | |
References | (CONFIRM) https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984 - Patch, Third Party Advisory | |
References | (MISC) https://github.com/redis/redis/pull/10651 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 5.5 |
CWE | CWE-476 |
08 May 2022, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 May 2022, 09:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Apr 2022, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules. |
27 Apr 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-04-27 20:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-24736
Mitre link : CVE-2022-24736
CVE.ORG link : CVE-2022-24736
JSON object : View
Products Affected
fedoraproject
- fedora
redis
- redis
netapp
- management_services_for_element_software
- management_services_for_netapp_hci
oracle
- communications_operations_monitor
CWE
CWE-476
NULL Pointer Dereference