跳转到帖子

Red Hat: CVE-2022-36021: redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow (Multiple Advisories)

recommended_posts

发布于
  • Members

Red Hat: CVE-2022-36021: redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow (Multiple Advisories)

Severity
5
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:C)
Published
03/01/2023
Created
01/24/2025
Added
01/23/2025
Modified
01/23/2025

Description

Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.

Solution(s)

  • redhat-upgrade-redis
  • redhat-upgrade-redis-debuginfo
  • redhat-upgrade-redis-debugsource
  • redhat-upgrade-redis-devel
  • redhat-upgrade-redis-doc

References

  • CVE-2022-36021
  • RHSA-2025:0595
  • 查看数 741
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…