公告ID: |
KYLIN-2020-14147 |
安全等级: |
中等 |
产品: |
Kylin V3 |
发布日期: |
2020年6月15日 |
CVE: |
CVE-2020-14147 |
CVSS3评分: |
7.6 |
概述:
None
描述:
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
系统版本:
KYLIN 3.4.x
受影响包列表:
redis