CVE-2022-24736

NameCVE-2022-24736
DescriptionRedis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redis (PTS)stretch3:3.2.6-3+deb9u3vulnerable
stretch (security)3:3.2.6-3+deb9u9vulnerable
buster, buster (security)5:5.0.14-1+deb10u2vulnerable
bullseye (security), bullseye5:6.0.16-1+deb11u2vulnerable
bookworm5:6.0.16-2vulnerable
sid5:6.0.16-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redissourceexperimental5:7.0.0-1
redissource(unstable)(unfixed)

Notes

https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984
https://github.com/redis/redis/pull/10651

Search for package or bug name: Reporting problems