|
|
Log in / Subscribe / Register

redis: code execution

Package(s):redis CVE #(s):CVE-2016-8339
Created:February 21, 2017 Updated:February 22, 2017
Description: From the CVE entry:

A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.

Alerts:
Gentoo 201702-16 redis 2017-02-21

to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds