UBUNTU-CVE-2022-31144

Source
https://ubuntu.com/security/CVE-2022-31144
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-31144.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2022-31144
Related
Published
2022-07-19T21:15:00Z
Modified
2022-07-19T21:15:00Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Redis is an in-memory database that persists on disk. A specially crafted XAUTOCLAIM command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.

References

Affected packages

Ubuntu:24.04:LTS / redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:7.0.12-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "5:7.0.12-1",
            "binary_name": "redis"
        },
        {
            "binary_version": "5:7.0.12-1",
            "binary_name": "redis-sentinel"
        },
        {
            "binary_version": "5:7.0.12-1",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "5:7.0.12-1",
            "binary_name": "redis-tools"
        },
        {
            "binary_version": "5:7.0.12-1",
            "binary_name": "redis-tools-dbgsym"
        }
    ]
}