CVE-2022-24834

EUVD-2022-29620
Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
GitHub_MCNA
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Affected Products (NVD)
VendorProductVersion
redisredis
2.6.0 ≤
𝑥
< 6.0.20
redisredis
6.2.0 ≤
𝑥
< 6.2.13
redisredis
7.0.0 ≤
𝑥
< 7.0.12
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
redis
bookworm
5:7.0.15-1~deb12u1
fixed
bookworm (security)
5:7.0.15-1~deb12u1
fixed
bullseye
vulnerable
bullseye (security)
5:6.0.16-1+deb11u3
fixed
buster
no-dsa
sid
5:7.0.15-2
fixed
trixie
5:7.0.15-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
redis
bionic
Fixed 5:4.0.9-1ubuntu0.2+esm4
released
focal
Fixed 5:5.0.7-2ubuntu0.1+esm2
released
jammy
Fixed 5:6.0.16-1ubuntu1+esm1
released
kinetic
ignored
lunar
ignored
mantic
not-affected
noble
not-affected
trusty
Fixed 2:2.8.4-2ubuntu0.2+esm3
released
xenial
Fixed 2:3.0.6-1ubuntu0.4+esm2
released