CVE-2022-35977

Name
CVE-2022-35977
Description
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/redis/redis/security/advisories/GHSA-mrcw-fhw9-fj8j
MISC https://github.com/redis/redis/commit/1ec82e6e97e1db06a72ca505f9fbf6b981f31ef7
MISC https://github.com/redis/redis/releases/tag/6.0.17
MISC https://github.com/redis/redis/releases/tag/6.2.9
MISC https://github.com/redis/redis/releases/tag/7.0.8

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 6.0.0 < 6.0.17
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 6.2.0 < 6.2.9
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 7.0.0 < 7.0.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status