CVE-2022-24736

NameCVE-2022-24736
DescriptionRedis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redis (PTS)jessie, jessie (lts)2:2.8.17-1+deb8u12vulnerable
stretch (security)3:3.2.6-3+deb9u9vulnerable
stretch (lts), stretch3:3.2.6-3+deb9u12vulnerable
buster5:5.0.14-1+deb10u2vulnerable
buster (security)5:5.0.14-1+deb10u5vulnerable
bullseye (security), bullseye5:6.0.16-1+deb11u2vulnerable
bookworm (security), bookworm5:7.0.15-1~deb12u1fixed
sid, trixie5:7.0.15-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redissourceexperimental5:7.0.0-1
redissource(unstable)5:7.0.1-4

Notes

[bullseye] - redis <ignored> (Minor issue; requires authed user; problematic to backport patch)
[buster] - redis <ignored> (Minor issue; requires authed user; problematic to backport patch)
[stretch] - redis <ignored> (Minor issue, problematic to backport patch to embedded Lua engine)
https://github.com/redis/redis/security/advisories/GHSA-3qpw-7686-5984
https://github.com/redis/redis/pull/10651
[jessie] - redis <no-dsa> (Minor issue, problematic to backport patch to embedded Lua engine)

Search for package or bug name: Reporting problems