CVE-2024-55656

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-55656
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-55656.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-55656
Aliases
  • GHSA-x5rx-rmq3-ff3h
Published
2025-01-08T15:38:54.859Z
Modified
2025-12-05T07:34:56.634510Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
RedisBloom Integer Overflow Remote Code Execution Vulnerability
Details

RedisBloom adds a set of probabilistic data structures to Redis. There is an integer overflow vulnerability in RedisBloom, which is a module used in Redis. The integer overflow vulnerability allows an attacker (a redis client which knows the password) to allocate memory in the heap lesser than the required memory due to wraparound. Then read and write can be performed beyond this allocated memory, leading to info leak and OOB write. The integer overflow is in CMS.INITBYDIM command, which initialize a Count-Min Sketch to dimensions specified by user. It accepts two values (width and depth) and uses them to allocate memory in NewCMSketch(). This vulnerability is fixed in 2.2.19, 2.4.12, 2.6.14, and 2.8.2.

Database specific
{
    "cwe_ids": [
        "CWE-190"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/55xxx/CVE-2024-55656.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/redisbloom/redisbloom

Affected ranges

Type
GIT
Repo
https://github.com/redisbloom/redisbloom
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.4.0"
        },
        {
            "fixed": "2.4.12"
        }
    ]
}
Type
GIT
Repo
https://github.com/redisbloom/redisbloom
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.6.0"
        },
        {
            "fixed": "2.6.14"
        }
    ]
}
Type
GIT
Repo
https://github.com/redisbloom/redisbloom
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.8.0"
        },
        {
            "fixed": "2.8.2"
        }
    ]
}

Affected versions

v2.*

v2.8.0
v2.8.1

Database specific

unresolved_ranges

[
    {
        "events": [
            {
                "introduced": "2.2.0"
            },
            {
                "fixed": "2.2.19"
            }
        ]
    }
]