NA

CVE-2023-41056

Published: 10/01/2024 Updated: 23/02/2024
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 0

Vulnerability Summary

Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redis redis

fedoraproject fedora 38

fedoraproject fedora 39

Vendor Advisories

Debian Bug report logs - #1060316 redis: CVE-2023-41056 Package: redis; Maintainer for redis is Chris Lamb <lamby@debianorg>; Source for redis is src:redis (PTS, buildd, popcon) Reported by: "Chris Lamb" <lamby@debianorg> Date: Tue, 9 Jan 2024 13:45:04 UTC Severity: grave Tags: security, upstream Found in versio ...
Redis is an in-memory database that persists on disk Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution This issue has been patched in version 7015 and 724 (CVE-2023-41056) Redis is an in-memory database that persists on disk On startup, R ...
Description<!----> This CVE is under investigation by Red Hat Product Security ...