Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted SETRANGE and SORT(_RO) commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.
{
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/35xxx/CVE-2022-35977.json",
"cna_assigner": "GitHub_M",
"cwe_ids": [
"CWE-190"
]
}{
"cpe": "cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.17"
},
{
"introduced": "6.2.0"
},
{
"fixed": "6.2.9"
},
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.8"
}
],
"source": [
"CPE_FIELD",
"REFERENCES"
]
}