Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to SCRIPT LOAD and EVAL commands using ACL rules.
{
"binaries": [
{
"binary_name": "redis",
"binary_version": "5:4.0.9-1ubuntu0.2+esm6"
},
{
"binary_name": "redis-sentinel",
"binary_version": "5:4.0.9-1ubuntu0.2+esm6"
},
{
"binary_name": "redis-server",
"binary_version": "5:4.0.9-1ubuntu0.2+esm6"
},
{
"binary_name": "redis-tools",
"binary_version": "5:4.0.9-1ubuntu0.2+esm6"
}
]
}
{
"binaries": [
{
"binary_name": "redis",
"binary_version": "5:5.0.7-2ubuntu0.1+esm4"
},
{
"binary_name": "redis-sentinel",
"binary_version": "5:5.0.7-2ubuntu0.1+esm4"
},
{
"binary_name": "redis-server",
"binary_version": "5:5.0.7-2ubuntu0.1+esm4"
},
{
"binary_name": "redis-tools",
"binary_version": "5:5.0.7-2ubuntu0.1+esm4"
}
]
}
{
"binaries": [
{
"binary_name": "redis",
"binary_version": "5:6.0.16-1ubuntu1.1+esm1"
},
{
"binary_name": "redis-sentinel",
"binary_version": "5:6.0.16-1ubuntu1.1+esm1"
},
{
"binary_name": "redis-server",
"binary_version": "5:6.0.16-1ubuntu1.1+esm1"
},
{
"binary_name": "redis-tools",
"binary_version": "5:6.0.16-1ubuntu1.1+esm1"
}
]
}