We found results for “”
CVE-2022-35977
Date: January 20, 2023
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted "SETRANGE" and "SORT(_RO)" commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Language: C
Severity Score
Related Resources (11)
Severity Score
Weakness Type (CWE)
Integer Overflow or Wraparound
CWE-190CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | LOCAL |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | NONE |
| Integrity (I): | NONE |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


