First published: Wed Apr 27 2022(Updated: )
Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redis | <6.2.7 | |
Redis | =7.0-rc1 | |
Redis | =7.0-rc2 | |
Redis | =7.0-rc3 | |
Fedora | =34 | |
Fedora | =35 | |
Fedora | =36 | |
netapp management services for element software | ||
NetApp Management Services for NetApp HCI | ||
Oracle Communications Operations Monitor | =4.3 | |
Oracle Communications Operations Monitor | =4.4 | |
Oracle Communications Operations Monitor | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24736 is a vulnerability in Redis versions prior to 6.2.7 and 7.0.0 that allows an attacker to crash the redis-server process by loading a specially crafted Lua script.
CVE-2022-24736 has a severity rating of 5.5 (medium).
To fix CVE-2022-24736, you must upgrade Redis to version 6.2.7 or 7.0.0.
Redis versions prior to 6.2.7 and 7.0.0 are affected by CVE-2022-24736.
You can find more information about CVE-2022-24736 in the following references: [Reference 1](https://github.com/redis/redis/pull/10651), [Reference 2](https://github.com/redis/redis/releases/tag/6.2.7), [Reference 3](https://github.com/redis/redis/releases/tag/7.0.0).