Lucene search

K
mageiaGentoo FoundationMGASA-2015-0244
HistoryJun 19, 2015 - 4:33 p.m.

Updated redis package fixes security vulnerability

2015-06-1916:33:05
Gentoo Foundation
advisories.mageia.org
11

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.019 Low

EPSS

Percentile

88.6%

It was discovered that redis, a persistent key-value database, could execute insecure Lua bytecode by way of the EVAL command. This could allow remote attackers to break out of the Lua sandbox and execute arbitrary code (CVE-2015-4335).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchredis< 2.6.5-4.1redis-2.6.5-4.1.mga4

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.019 Low

EPSS

Percentile

88.6%