CVE-2022-24834

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
GitHub_MCNA
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 96%
VendorProductVersion
redisredis
2.6.0 ≤
𝑥
< 6.0.20
redisredis
6.2.0 ≤
𝑥
< 6.2.13
redisredis
7.0.0 ≤
𝑥
< 7.0.12
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
redis
bullseye
vulnerable
buster
no-dsa
bullseye (security)
5:6.0.16-1+deb11u3
fixed
bookworm
5:7.0.15-1~deb12u1
fixed
bookworm (security)
5:7.0.15-1~deb12u1
fixed
sid
5:7.0.15-2
fixed
trixie
5:7.0.15-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
redis
noble
not-affected
mantic
not-affected
lunar
ignored
kinetic
ignored
jammy
Fixed 5:6.0.16-1ubuntu1+esm1
released
focal
Fixed 5:5.0.7-2ubuntu0.1+esm2
released
bionic
Fixed 5:4.0.9-1ubuntu0.2+esm4
released
xenial
Fixed 2:3.0.6-1ubuntu0.4+esm2
released
trusty
Fixed 2:2.8.4-2ubuntu0.2+esm3
released