First published: Wed Mar 01 2023(Updated: )
(<a href="https://access.redhat.com/security/cve/CVE-2023-25155">CVE-2023-25155</a>) Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. <a href="https://github.com/gentoo/gentoo/pull/29860">https://github.com/gentoo/gentoo/pull/29860</a>
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Planning Analytics | <=2.0 | |
debian/redis | <=5:5.0.14-1+deb10u2<=5:6.0.16-1+deb11u2 | 5:5.0.14-1+deb10u5 5:7.0.15-1~deb12u1 5:7.0.15-1 |
ubuntu/redis | <5:4.0.9-1ubuntu0.2+ | 5:4.0.9-1ubuntu0.2+ |
ubuntu/redis | <5:5.0.7-2ubuntu0.1+ | 5:5.0.7-2ubuntu0.1+ |
ubuntu/redis | <5:6.0.16-1ubuntu1+ | 5:6.0.16-1ubuntu1+ |
ubuntu/redis | <2:2.8.4-2ubuntu0.2+ | 2:2.8.4-2ubuntu0.2+ |
ubuntu/redis | <6.0.18<6.2.11<7.0.9 | 6.0.18 6.2.11 7.0.9 |
ubuntu/redis | <2:3.0.6-1ubuntu0.4+ | 2:3.0.6-1ubuntu0.4+ |
Redis | <6.0.18 | |
Redis | >=6.2.0<6.2.11 | |
Redis | >=7.0.0<7.0.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36021 is a vulnerability in Redis that allows authenticated users to trigger a denial-of-service attack by using string matching commands with a specially crafted pattern.
This vulnerability can be exploited by authenticated users using string matching commands like `SCAN` or `KEYS` with a specific pattern.
CVE-2022-36021 has a severity rating of medium.
To fix CVE-2022-36021, it is recommended to upgrade Redis to version 6.0.18 (for Redis 6.0) or versions between 6.2.0 and 6.2.11 (for Redis 6.2), or between 7.0.0 and 7.0.9 (for Redis 7.0).
The CWE ID for CVE-2022-36021 is CWE-407.