First published: Wed Jan 10 2024(Updated: )
Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ioredis | >=7.0.9<7.0.15 | |
ioredis | >=7.2.0<7.2.4 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41056 is considered a critical vulnerability due to its potential for remote code execution.
To fix CVE-2023-41056, upgrade Redis to version 7.0.15 or 7.2.4 or later.
CVE-2023-41056 affects Redis versions prior to 7.0.15 and between 7.2.0 and 7.2.4.
Exploitation of CVE-2023-41056 can lead to heap overflow and potentially allow an attacker to execute arbitrary code on the server.
Yes, the known fix for CVE-2023-41056 is to update to Redis version 7.0.15 or 7.2.4.