[Secure-testing-team] Bug#878076: redis: CVE-2017-15047: Insufficient input validation in the clusterLoadConfig function

Salvatore Bonaccorso carnil at debian.org
Mon Oct 9 15:19:24 UTC 2017


Source: redis
Version: 3:3.2.6-1
Severity: normal
Tags: upstream security
Forwarded: https://github.com/antirez/redis/issues/4278

Hi,

the following vulnerability was published for redis.

CVE-2017-15047[0]:
| The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows
| attackers to cause a denial of service (out-of-bounds array index and
| application crash) or possibly have unspecified other impact by
| leveraging "limited access to the machine."

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-15047
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15047
[1] https://github.com/antirez/redis/issues/4278

Regards,
Salvatore



More information about the Secure-testing-team mailing list