CVE-2022-24736

Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
3.3 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
GitHub_MCNA
3.3 LOW
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 56%
VendorProductVersion
redisredis
𝑥
< 6.2.7
redisredis
7.0:rc1
redisredis
7.0:rc2
redisredis
7.0:rc3
netappmanagement_services_for_element_software
-
netappmanagement_services_for_netapp_hci
-
oraclecommunications_operations_monitor
4.3
oraclecommunications_operations_monitor
4.4
oraclecommunications_operations_monitor
5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
redis
bullseye
ignored
buster
ignored
stretch
ignored
bullseye (security)
vulnerable
bookworm
5:7.0.15-1~deb12u1
fixed
bookworm (security)
5:7.0.15-1~deb12u1
fixed
sid
5:7.0.15-2
fixed
trixie
5:7.0.15-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
redis
noble
not-affected
mantic
not-affected
lunar
ignored
kinetic
ignored
jammy
needed
impish
ignored
focal
needed
bionic
needed
xenial
needed
trusty
needed
References