Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-35977
HistoryJan 20, 2023 - 12:00 a.m.

CVE-2022-35977

2023-01-2000:00:00
ubuntu.com
ubuntu.com
14
redis
integer overflow
setrange
sort
memory allocation
upgrade
vulnerability
unix

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

14.2%

Redis is an in-memory database that persists on disk. Authenticated users
issuing specially crafted SETRANGE and SORT(_RO) commands can trigger
an integer overflow, resulting with Redis attempting to allocate impossible
amounts of memory and abort with an out-of-memory (OOM) panic. The problem
is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to
upgrade. There are no known workarounds for this vulnerability.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchredis< 5:4.0.9-1ubuntu0.2+esm4UNKNOWN
ubuntu20.04noarchredis< 5:5.0.7-2ubuntu0.1+esm2UNKNOWN
ubuntu22.04noarchredis< 5:6.0.16-1ubuntu1+esm1UNKNOWN
ubuntu14.04noarchredis< 2:2.8.4-2ubuntu0.2+esm3UNKNOWN
ubuntu16.04noarchredis< 2:3.0.6-1ubuntu0.4+esm2UNKNOWN

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.0004 Low

EPSS

Percentile

14.2%