Buffer overflow in redis-cli of Redis before 4.0.10 and 5.x before 5.0 RC3 allows an attacker to achieve code execution and escalate to higher privileges via a crafted command line. NOTE: It is unclear whether there are any common situations in which redis-cli is used with, for example, a -h (aka hostname) argument from an untrusted source.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "redis-sentinel",
"binary_version": "2:3.0.6-1ubuntu0.2"
},
{
"binary_name": "redis-server",
"binary_version": "2:3.0.6-1ubuntu0.2"
},
{
"binary_name": "redis-tools",
"binary_version": "2:3.0.6-1ubuntu0.2"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "redis",
"binary_version": "5:4.0.9-1ubuntu0.1"
},
{
"binary_name": "redis-sentinel",
"binary_version": "5:4.0.9-1ubuntu0.1"
},
{
"binary_name": "redis-server",
"binary_version": "5:4.0.9-1ubuntu0.1"
},
{
"binary_name": "redis-tools",
"binary_version": "5:4.0.9-1ubuntu0.1"
}
]
}