QID 356171

Date Published: 2023-09-28

QID 356171: Amazon Linux Security Advisory for redis : ALASREDIS6-2023-001

Redis is an in-memory database that persists on disk.
Authenticated users issuing specially crafted `setrange` and `sort(_ro)` commands can trigger an integer overflow, resulting with redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (oom) panic.
The problem is fixed in redis versions 7.0.8, 6.2.9 and 6.0.17.
Users are advised to upgrade.
There are no known workarounds for this vulnerability. (
( CVE-2022-35977) redis is an in-memory database that persists on disk.
Authenticated users can use string matching commands (like `scan` or `keys`) with a specially crafted pattern to trigger a denial-of-service attack on redis, causing it to hang and consume 100% cpu time.
The problem is fixed in redis versions 6.0.18, 6.2.11, 7.0.9. (
( CVE-2022-36021) redis is an in-memory database that persists on disk.
Authenticated users can issue a `hrandfield` or `zrandmember` command with specially crafted arguments to trigger a denial-of-service by crashing redis with an assertion failure.
This problem affects redis versions 6.2 or newer up to but not including 6.2.9 as well as versions 7.0 up to but not including 7.0.8.
( CVE-2023-22458) redis is an in-memory database that persists on disk.
Authenticated users issuing specially crafted `srandmember`, `zrandmember`, and `hrandfield` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the redis server process.
This problem affects all redis versions.
Patches were released in redis version(s) 6.0.18, 6.2.11 and 7.0.9. (
( CVE-2023-25155)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 6.5 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALASREDIS6-2023-001 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356171

    Software Advisories
    Advisory ID Software Component Link
    ALASREDIS6-2023-001 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASREDIS6-2023-001.html