CVE Vulnerabilities

CVE-2022-36021

Inefficient Algorithmic Complexity

Published: Mar 01, 2023 | Modified: Nov 21, 2024
CVSS 3.x
5.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
5.5 MODERATE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.

Weakness

An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.

Affected Software

NameVendorStart VersionEnd Version
RedisRedis*6.0.18 (excluding)
RedisRedis6.2.0 (including)6.2.11 (excluding)
RedisRedis7.0.0 (including)7.0.9 (excluding)
Red Hat Enterprise Linux 8RedHatredis:6-8100020250113083959.489197e6*
RedisUbuntubionic*
RedisUbuntuesm-apps/bionic*
RedisUbuntuesm-apps/focal*
RedisUbuntuesm-apps/jammy*
RedisUbuntuesm-apps/xenial*
RedisUbuntuesm-infra-legacy/trusty*
RedisUbuntufocal*
RedisUbuntujammy*
RedisUbuntukinetic*
RedisUbuntulunar*
RedisUbuntutrusty*
RedisUbuntutrusty/esm*
RedisUbuntuupstream*
RedisUbuntuxenial*

References