Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-41056

Опубликовано: 10 янв. 2024
Источник: debian

Описание

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
redisfixed5:7.0.15-1package
redisnot-affectedbullseyepackage
redisnot-affectedbusterpackage

Примечания

  • Introduced with changes from: https://github.com/redis/redis/pull/11766 (which landed

  • in 7.2, but which also got backported to the 7.0. branch)

  • https://github.com/redis/redis/commit/e351099e1119fb89496be578f5232c61ce300224 (7.0.15)

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 2 лет назад

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

CVSS3: 8.1
redhat
около 2 лет назад

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

CVSS3: 8.1
nvd
около 2 лет назад

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

CVSS3: 8.1
fstec
около 2 лет назад

Уязвимость системы управления базами данных (СУБД) Redis, связанная с целочисленным переполнением, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
redos
почти 2 года назад

Уязвимость redis