First published: Fri Jan 20 2023(Updated: )
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redis Redis | >=6.0.0<6.0.17 | |
Redis Redis | >=6.2.0<6.2.9 | |
Redis Redis | >=7.0.0<7.0.8 | |
IBM Planning Analytics | <=2.0 | |
debian/redis | <=5:5.0.14-1+deb10u2<=5:5.0.14-1+deb10u5<=5:6.0.16-1+deb11u2 | 5:7.0.15-1~deb12u1 5:7.0.15-1 |
ubuntu/redis | <5:4.0.9-1ubuntu0.2+ | 5:4.0.9-1ubuntu0.2+ |
ubuntu/redis | <5:5.0.7-2ubuntu0.1+ | 5:5.0.7-2ubuntu0.1+ |
ubuntu/redis | <5:6.0.16-1ubuntu1+ | 5:6.0.16-1ubuntu1+ |
ubuntu/redis | <2:2.8.4-2ubuntu0.2+ | 2:2.8.4-2ubuntu0.2+ |
ubuntu/redis | <7.0.8 | 7.0.8 |
ubuntu/redis | <2:3.0.6-1ubuntu0.4+ | 2:3.0.6-1ubuntu0.4+ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35977 is a vulnerability in Redis, an in-memory database that persists on disk, which allows authenticated users to trigger an integer overflow by issuing specially crafted SETRANGE and SORT(_RO) commands, leading to an out-of-memory panic.
CVE-2022-35977 has a severity rating of medium with a CVSS score of 5.5.
Redis versions 6.0.0 to 6.0.17, 6.2.0 to 6.2.9, and 7.0.0 to 7.0.8 are affected by CVE-2022-35977.
Authenticated users can exploit CVE-2022-35977 by issuing specially crafted SETRANGE and SORT(_RO) commands to trigger an integer overflow.
To fix CVE-2022-35977, upgrade to Redis versions 6.0.18, 6.2.10, or 7.0.9 or later.