First published: Wed Mar 01 2023(Updated: )
(<a href="https://access.redhat.com/security/cve/CVE-2022-36021">CVE-2022-36021</a>) String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. <a href="https://github.com/gentoo/gentoo/pull/29860">https://github.com/gentoo/gentoo/pull/29860</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Redis |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2174306 is a critical vulnerability affecting Redis that can lead to a denial-of-service attack.
To fix REDHAT-BUG-2174306, you should update your Redis installation to the latest version that addresses this vulnerability.
The impact of REDHAT-BUG-2174306 includes causing Redis to hang and consume 100% CPU time, disrupting service availability.
All versions of Redis prior to the fix for REDHAT-BUG-2174306 are potentially affected.
A temporary workaround for REDHAT-BUG-2174306 is to avoid using string matching commands with crafted patterns.