Bug 2257454 (CVE-2023-41056) - CVE-2023-41056 redis: Heap Buffer Overflow may lead to potential remote code execution
Summary: CVE-2023-41056 redis: Heap Buffer Overflow may lead to potential remote code ...
Keywords:
Status: NEW
Alias: CVE-2023-41056
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2257455 2257456 2257459
Blocks: 2257453
TreeView+ depends on / blocked
 
Reported: 2024-01-09 18:49 UTC by Marco Benatto
Modified: 2024-02-28 06:19 UTC (History)
52 users (show)

Fixed In Version: redis 7.2.4, redis 7.0.15
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Redis. When processing a certain sequence of payloads, Redis may incorrectly handle the resizing of memory buffers, leading to a heap-based buffer overflow, potentially resulting in a denial of service or remote code execution.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Marco Benatto 2024-01-09 18:49:01 UTC
In some cases, Redis may incorrectly handle resizing of memory buffers which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution.

Reference:
https://github.com/redis/redis/security/advisories/GHSA-xr47-pcmx-fq2m

Comment 1 Marco Benatto 2024-01-09 18:49:24 UTC
Created redis tracking bugs for this issue:

Affects: epel-all [bug 2257456]
Affects: fedora-all [bug 2257455]


Note You need to log in before you can comment on or make changes to this bug.