Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2023-36824

Published: 11 July 2023

Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted `COMMAND GETKEYS` or `COMMAND GETKEYSANDFLAGS`and authenticated users who were set with ACL rules that match key names, executing a specially crafted command that refers to a variadic list of key names. The vulnerability is patched in Redis 7.0.12.

Priority

Medium

Cvss 3 Severity Score

8.8

Score breakdown

Status

Package Release Status
redis
Launchpad, Ubuntu, Debian
bionic Not vulnerable
(only redis 7.0 and newer)
focal Not vulnerable
(only redis 7.0 and newer)
jammy Not vulnerable
(only redis 7.0 and newer)
kinetic Ignored
(end of life, was needs-triage)
lunar Ignored
(end of life, was needs-triage)
mantic Not vulnerable
(5:7.0.12-1)
noble Not vulnerable
(5:7.0.12-1)
trusty Not vulnerable
(only redis 7.0 and newer)
upstream
Released (5:7.0.12-1)
xenial Not vulnerable
(only redis 7.0 and newer)

Severity score breakdown

Parameter Value
Base score 8.8
Attack vector Network
Attack complexity Low
Privileges required Low
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H