DLA-3361-1

Import Source
https://storage.googleapis.com/debian-osv/dla-osv/DLA-3361-1.json
Related
Published
2023-03-13T00:00:00Z
Modified
2023-06-28T06:25:32.262801Z
Details

It was discovered that there was a potential remote denial of service vulnerability in Redis, a popular key-value database.

Authenticated users could have used string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack, causing it to hang and consume 100% CPU time.

  • CVE-2022-36021 Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.

For Debian 10 Buster, this problem has been fixed in version 5:5.0.14-1+deb10u3.

We recommend that you upgrade your redis packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS

References

Affected packages

Debian:10 / redis

Package

Name
redis

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
5:5.0.14-1+deb10u3

Affected versions

5:5.*

5:5.0.3-4
5:5.0.3-4+deb10u1
5:5.0.3-4+deb10u2
5:5.0.3-4+deb10u3
5:5.0.4-1
5:5.0.5-1
5:5.0.5-2~bpo10+1
5:5.0.5-2
5:5.0.6-1~bpo10+1
5:5.0.6-1
5:5.0.7-1~bpo10+1
5:5.0.7-1
5:5.0.7-2
5:5.0.7-3
5:5.0.7-4
5:5.0.7-5
5:5.0.7-6
5:5.0.7-7~bpo10+1
5:5.0.7-7
5:5.0.14-1+deb10u1
5:5.0.14-1+deb10u2