MGASA-2023-0086

Source
https://advisories.mageia.org/MGASA-2023-0086.html
Import Source
https://advisories.mageia.org/MGASA-2023-0086.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0086
Related
Published
2023-03-11T19:00:39Z
Modified
2023-03-11T17:55:30Z
Summary
Updated redis packages fix security vulnerability
Details

Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (CVE-2023-25155)

String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. (CVE-2022-36021)

References
Credits

Affected packages

Mageia:8 / redis

Package

Name
redis
Purl
pkg:rpm/mageia/redis?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.0.18-1.mga8

Ecosystem specific

{
    "section": "core"
}