Integer overflow in certain command arguments can drive Redis to OOM panic
CVE-2022-35977

5.5MEDIUM

Key Information:

Vendor

Redis

Status
Vendor
CVE Published:
20 January 2023

What is CVE-2022-35977?

Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted SETRANGE and SORT(_RO) commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Affected Version(s)

redis >= 7.0, < 7.0.8 < 7.0, 7.0.8

redis >= 6.2, < 6.2.9 < 6.2, 6.2.9

redis < 6.0.17 < 6.0.17

References

EPSS Score

40% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.