CVE-2023-41056
Description
Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.
CWE
- CWE-762 — CWE-762: Mismatched Memory Management Routines
- CWE-190 — CWE-190: Integer Overflow or Wraparound
Affected
- redis / redis — v=>= 7.0.9, < 7.0.15 [affected]; v=>= 7.2.0, < 7.2.4 [affected]
CVSS
- 3.1 score=8.1 severity=HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
References
- https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m x_refsource_CONFIRM
- https://github.com/redis/redis/releases/tag/7.0.15 x_refsource_MISC
- https://github.com/redis/redis/releases/tag/7.2.4 x_refsource_MISC
- https://lists.fedoraproject.org/archives/list/[email protected]/message/3JTGQJ2YLYB24B72I5B5H32YIMPVSWIT/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/JTWHPLC3RI67VNRDOIXLDVNC5YMYBMQN/
- https://security.netapp.com/advisory/ntap-20240223-0003/
Source
cvelistV5-main/cves/2023/41xxx/CVE-2023-41056.json