CVE-2022-35977

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:12

Type Values Removed Values Added
References () https://github.com/redis/redis/commit/1ec82e6e97e1db06a72ca505f9fbf6b981f31ef7 - Patch, Third Party Advisory () https://github.com/redis/redis/commit/1ec82e6e97e1db06a72ca505f9fbf6b981f31ef7 - Patch, Third Party Advisory
References () https://github.com/redis/redis/releases/tag/6.0.17 - Release Notes, Third Party Advisory () https://github.com/redis/redis/releases/tag/6.0.17 - Release Notes, Third Party Advisory
References () https://github.com/redis/redis/releases/tag/6.2.9 - Release Notes, Third Party Advisory () https://github.com/redis/redis/releases/tag/6.2.9 - Release Notes, Third Party Advisory
References () https://github.com/redis/redis/releases/tag/7.0.8 - Release Notes, Third Party Advisory () https://github.com/redis/redis/releases/tag/7.0.8 - Release Notes, Third Party Advisory
References () https://github.com/redis/redis/security/advisories/GHSA-mrcw-fhw9-fj8j - Third Party Advisory () https://github.com/redis/redis/security/advisories/GHSA-mrcw-fhw9-fj8j - Third Party Advisory
Summary
  • (es) Redis es una base de datos en memoria que persiste en el disco. Los usuarios autenticados que emiten comandos `SETRANGE` y `SORT(_RO)` especialmente manipulados pueden desencadenar un desbordamiento de enteros, lo que hace que Redis intente asignar cantidades imposibles de memoria y aborte con un pánico de falta de memoria (OOM). El problema se solucionó en las versiones 7.0.8, 6.2.9 y 6.0.17 de Redis. Se recomienda a los usuarios que actualicen. No se conocen soluciones para esta vulnerabilidad.

Information

Published : 2023-01-20 19:15

Updated : 2024-11-21 07:12


NVD link : CVE-2022-35977

Mitre link : CVE-2022-35977

CVE.ORG link : CVE-2022-35977


JSON object : View

Products Affected

redis

  • redis
CWE
CWE-190

Integer Overflow or Wraparound