发布时间: 2022年8月13日
修改时间: 2025年2月21日
Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching the redis-server executable, if Lua scripting is not being used, is to block access to `SCRIPT LOAD` and `EVAL` commands using ACL rules.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Local | Local |
CVSS评分 | 5.5 | 5.5 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2022-1911 | redis6 security update | 2022年8月13日 |
KylinSec-SA-2025-1634 | redis security update | 2025年3月18日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | redis6 | Fixed |
KY3.4-5A | redis6 | Fixed |
V6 | redis6 | Fixed |
KY3.5.1 | redis6 | Fixed |
KY3.5.3 | redis6 | Fixed |