First published: Fri Jan 20 2023(Updated: )
Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newer up to but not including 6.2.9 as well as versions 7.0 up to but not including 7.0.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/redis | <6.2.9 | 6.2.9 |
redhat/redis | <7.0.8 | 7.0.8 |
ioredis | >=6.2.0<6.2.9 | |
ioredis | >=7.0.0<7.0.8 | |
IBM Planning Analytics Cloud | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22458 is a vulnerability in Redis that allows authenticated users to trigger a denial-of-service by crashing Redis with an assertion failure.
Redis versions 6.2 up to but not including 6.2.9, as well as versions 7.0 up to but not including 7.0.8, are affected by CVE-2023-22458.
CVE-2023-22458 has a severity rating of 5.5 (medium).
Authenticated users can exploit CVE-2023-22458 by issuing a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments.
To fix CVE-2023-22458, update Redis to version 6.2.9 or 7.0.8 or newer.