MGASA-2015-0472

Source
https://advisories.mageia.org/MGASA-2015-0472.html
Import Source
https://advisories.mageia.org/MGASA-2015-0472.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2015-0472
Related
Published
2015-12-16T21:01:04Z
Modified
2015-12-16T20:54:36Z
Summary
Updated redis packages fix CVE-2015-8080
Details

Luca Bruno discovered an integer overflow flaw leading to a stack-based buffer overflow in redis, a persistent key-value database. A remote attacker can use this flaw to cause a denial of service (application crash) (CVE-2015-8080).

References
Credits

Affected packages

Mageia:5 / redis

Package

Name
redis
Purl
pkg:rpm/mageia/redis?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.13-4.1.mga5

Ecosystem specific

{
    "section": "core"
}