Описание
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | |
esm-apps/bionic | not-affected | |
esm-apps/focal | not-affected | |
esm-apps/jammy | not-affected | |
esm-apps/noble | not-affected | |
esm-apps/xenial | not-affected | |
esm-infra-legacy/trusty | not-affected | |
focal | not-affected | |
jammy | not-affected | |
noble | not-affected |
Показывать по
Связанные уязвимости
A flaw was found in the Hiredis library. This vulnerability allows a local attacker to cause a denial of service via crafted input data that triggers a heap buffer overflow during Redis command formatting.
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Buffer Overflow in hiredis 1.2.0 allows a local attacker to cause a denial of service via the sdscatlen function.