Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newer up to but not including 6.2.9 as well as versions 7.0 up to but not including 7.0.8. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Thu, 13 Feb 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:8 | |
Vendors & Products |
Redhat
Redhat enterprise Linux |

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-02T10:13:48.522Z
Reserved: 2022-12-29T03:00:40.878Z
Link: CVE-2023-22458

No data.

Status : Modified
Published: 2023-01-20T19:15:17.917
Modified: 2024-11-21T07:44:50.810
Link: CVE-2023-22458
