[Secure-testing-team] Bug#878076: redis: CVE-2017-15047: Insufficient input validation in the clusterLoadConfig function
Salvatore Bonaccorso
carnil at debian.org
Mon Oct 9 15:19:24 UTC 2017
Source: redis
Version: 3:3.2.6-1
Severity: normal
Tags: upstream security
Forwarded: https://github.com/antirez/redis/issues/4278
Hi,
the following vulnerability was published for redis.
CVE-2017-15047[0]:
| The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows
| attackers to cause a denial of service (out-of-bounds array index and
| application crash) or possibly have unspecified other impact by
| leveraging "limited access to the machine."
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2017-15047
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15047
[1] https://github.com/antirez/redis/issues/4278
Regards,
Salvatore
More information about the Secure-testing-team
mailing list