| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-ID: <SEYPR06MB6663186C23EC525DB6C31C30C5732@SEYPR06MB6663.apcprd06.prod.outlook.com> Date: Tue, 16 Jan 2024 13:34:52 +0000 From: Meng Ruijie <ruijie_meng@...us.edu> To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org> Subject: [FD] ODR violation in Redis Raft [Suggested description] Redis raft master-1b8bd86 to master-7b46079 was discovered to contain an ODR violation via the component hiredisAllocFns at /opt/fs/redisraft/deps/hiredis/alloc.c. [VulnerabilityType Other] AddressSanitizer: odr-violation [Vendor of Product] Redis [Affected Product Code Base] raft - master-1b8bd86 to master-7b46079 [Affected Component] affected executable [Attack Type] Remote [Impact Code execution] true [Impact Denial of Service] true [Attack Vectors] run redis with redisraft [Reference] https://github.com/RedisLabs/redisraft/issues/600 [Has vendor confirmed or acknowledged the vulnerability?] true [Discoverer] jerrytesting _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/
Powered by blists - more mailing lists