CVE-2022-24736

NameCVE-2022-24736
DescriptionRedis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redis (PTS)bullseye5:6.0.16-1+deb11u2vulnerable
bullseye (security)5:6.0.16-1+deb11u4vulnerable
bookworm, bookworm (security)5:7.0.15-1~deb12u1fixed
sid, trixie5:7.0.15-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redissourceexperimental5:7.0.0-1
redissource(unstable)5:7.0.1-4

Notes

[bullseye] - redis <ignored> (Minor issue; requires authed user; problematic to backport patch)
[buster] - redis <ignored> (Minor issue; requires authed user; problematic to backport patch)
[stretch] - redis <ignored> (Minor issue, problematic to backport patch to embedded Lua engine)
https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984
https://github.com/redis/redis/pull/10651

Search for package or bug name: Reporting problems