Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3885-1 | redis security update |
Debian DSA |
DSA-5610-1 | redis security update |
Ubuntu USN |
USN-6531-1 | Redis vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Feb 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T16:32:24.785Z
Reserved: 2022-02-10T16:41:34.931Z
Link: CVE-2022-24834
Updated: 2024-08-03T04:20:50.549Z
Status : Modified
Published: 2023-07-13T15:15:08.817
Modified: 2024-11-21T06:51:12.103
Link: CVE-2022-24834
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN