CVE-2023-22458
Description
Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newer up to but not including 6.2.9 as well as versions 7.0 up to but not including 7.0.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE
- CWE-190 — CWE-190: Integer Overflow or Wraparound
Affected
- redis / redis — v=>= 6.2, < 6.2.9 [affected]; v=>= 7.0, < 7.0.8 [affected]
CVSS
- 3.1 score=5.5 severity=MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
References
- https://github.com/redis/redis/security/advisories/GHSA-r8w2-2m53-gprj x_refsource_CONFIRM
- https://github.com/redis/redis/commit/16f408b1a0121cacd44cbf8aee275d69dc627f02 x_refsource_MISC
- https://github.com/redis/redis/releases/tag/6.2.9 x_refsource_MISC
- https://github.com/redis/redis/releases/tag/7.0.8 x_refsource_MISC
Source
cvelistV5-main/cves/2023/22xxx/CVE-2023-22458.json