CVE-2022-24736
27.04.2022, 20:15
Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.Enginsight
Vendor | Product | Version |
---|---|---|
redis | redis | 𝑥 < 6.2.7 |
redis | redis | 7.0:rc1 |
redis | redis | 7.0:rc2 |
redis | redis | 7.0:rc3 |
netapp | management_services_for_element_software | - |
netapp | management_services_for_netapp_hci | - |
oracle | communications_operations_monitor | 4.3 |
oracle | communications_operations_monitor | 4.4 |
oracle | communications_operations_monitor | 5.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References