Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-46686

Опубликовано: 23 июл. 2025
Источник: debian
EPSS Низкий

Описание

Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
redisunfixedpackage

Примечания

  • https://github.com/io-no/CVE-Reports/issues/1

  • https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9

  • Not cosindered a security issue by upstream, recommended to review redis

  • security best practices. Disagreement between reporter and upstream.

EPSS

Процентиль: 11%
0.00039
Низкий

Связанные уязвимости

CVSS3: 3.5
ubuntu
16 дней назад

Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.

CVSS3: 3.5
nvd
17 дней назад

Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.

CVSS3: 4.9
github
17 дней назад

Redis through 7.4.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions.

EPSS

Процентиль: 11%
0.00039
Низкий