DEBIAN-CVE-2022-31144

Source
https://security-tracker.debian.org/tracker/CVE-2022-31144
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2022-31144.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2022-31144
Upstream
Published
2022-07-19T21:15:15Z
Modified
2025-09-25T22:40:38Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Redis is an in-memory database that persists on disk. A specially crafted XAUTOCLAIM command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.

References

Affected packages

Debian:12 / redis

Package

Name
redis
Purl
pkg:deb/debian/redis?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:7.0.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / redis

Package

Name
redis
Purl
pkg:deb/debian/redis?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:7.0.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / redis

Package

Name
redis
Purl
pkg:deb/debian/redis?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:7.0.4-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}