8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
0.003 Low
EPSS
Percentile
70.8%
Redis is an in-memory database that persists on disk. A specially crafted
Lua script executing in Redis can trigger a heap overflow in the cjson
library, and result with heap corruption and potentially remote code
execution. The problem exists in all versions of Redis with Lua scripting
support, starting from 2.6, and affects only authenticated and authorized
users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | redis | < 5:4.0.9-1ubuntu0.2+esm4 | UNKNOWN |
ubuntu | 20.04 | noarch | redis | < 5:5.0.7-2ubuntu0.1+esm2 | UNKNOWN |
ubuntu | 22.04 | noarch | redis | < 5:6.0.16-1ubuntu1+esm1 | UNKNOWN |
ubuntu | 14.04 | noarch | redis | < 2:2.8.4-2ubuntu0.2+esm3 | UNKNOWN |
ubuntu | 16.04 | noarch | redis | < 2:3.0.6-1ubuntu0.4+esm2 | UNKNOWN |
access.redhat.com/security/cve/CVE-2022-24834
github.com/redis/redis/commit/936cfa464f371666c46bff59f7c4247d48973ec6 (7.2-rc3)
github.com/redis/redis/commit/f6a7c9f9ec9354702cc3143310a24bf3d1507b03 (7.0.12)
github.com/redis/redis/pull/12398
launchpad.net/bugs/cve/CVE-2022-24834
nvd.nist.gov/vuln/detail/CVE-2022-24834
raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES
security-tracker.debian.org/tracker/CVE-2022-24834
ubuntu.com/security/notices/USN-6531-1
www.cve.org/CVERecord?id=CVE-2022-24834