Description
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
References (5)
Core 5
Core References
Vendor Advisory x_refsource_confirm
https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83
Patch x_refsource_misc
https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619
Release Notes x_refsource_misc
https://github.com/redis/redis/releases/tag/6.0.18
Release Notes x_refsource_misc
https://github.com/redis/redis/releases/tag/6.2.11
Release Notes x_refsource_misc
https://github.com/redis/redis/releases/tag/7.0.9
Scores
CVSS v3
5.5
EPSS
0.0323
EPSS Percentile
87.1%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-190
Status
published
Products (1)
redis/redis
< 6.0.18
Published
Mar 02, 2023
Tracked Since
Feb 18, 2026