~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2017-15047

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2017-15047
2
 
PublicDate: 2017-10-06
3
 
References:
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15047
5
 
 https://github.com/antirez/redis/issues/4278
6
 
Description:
7
 
 The clusterLoadConfig function in cluster.c in Redis 4.0.2 allows attackers
8
 
 to cause a denial of service (out-of-bounds array index and application
9
 
 crash) or possibly have unspecified other impact by leveraging "limited
10
 
 access to the machine."
11
 
Ubuntu-Description:
12
 
Notes:
13
 
 leosilva> code not present in trusty
14
 
Bugs:
15
 
Priority: untriaged
16
 
Discovered-by:
17
 
Assigned-to:
18
 
 
19
 
 
20
 
Patches_redis:
21
 
upstream_redis: needs-triage
22
 
precise/esm_redis: DNE
23
 
trusty_redis: not-affected
24
 
vivid/ubuntu-core_redis: DNE
25
 
xenial_redis: needs-triage
26
 
zesty_redis: ignored (reached end-of-life)
27
 
artful_redis: needs-triage
28
 
bionic_redis: needs-triage
29
 
devel_redis: needs-triage