aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYasuhiro Kimura <yasu@FreeBSD.org>2023-03-21 05:47:49 +0000
committerYasuhiro Kimura <yasu@FreeBSD.org>2023-03-21 08:01:05 +0000
commit813c162637fcd998bd99215e30e52c5cccd084ba (patch)
tree06609fc1780724aed59d3b83aab9472ff74205cf
parent1f8461d12c173caf839e1b1e1456bb31798a68d2 (diff)
downloadports-813c162637fcd998bd99215e30e52c5cccd084ba.tar.gz
ports-813c162637fcd998bd99215e30e52c5cccd084ba.zip
security/vuxml: Document denial-of-serviece vulnerability in redis
-rw-r--r--security/vuxml/vuln/2023.xml34
1 files changed, 34 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml
index e1ebe5cdd044..fb52f9cc03fe 100644
--- a/security/vuxml/vuln/2023.xml
+++ b/security/vuxml/vuln/2023.xml
@@ -1,3 +1,37 @@
+ <vuln vid="a60cc0e4-c7aa-11ed-8a4b-080027f5fec9">
+ <topic>redis -- specially crafted MSETNX command can lead to denial-of-service</topic>
+ <affects>
+ <package>
+ <name>redis</name>
+ <range><lt>7.0.10</lt></range>
+ </package>
+ <package>
+ <name>redis-devel</name>
+ <range><lt>7.0.10.20230320</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Yupeng Yang reports:</p>
+ <blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-mvmm-4vq6-vw8c">
+ <p>
+ Authenticated users can use the MSETNX command to trigger
+ a runtime assertion and termination of the Redis server
+ process.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2023-28425</cvename>
+ <url>https://github.com/redis/redis/security/advisories/GHSA-mvmm-4vq6-vw8c</url>
+ </references>
+ <dates>
+ <discovery>2023-03-20</discovery>
+ <entry>2023-03-21</entry>
+ </dates>
+ </vuln>
+
<vuln vid="0d7d104c-c6fb-11ed-8a4b-080027f5fec9">
<topic>curl -- multiple vulnerabilities</topic>
<affects>