diff --git a/cve/redis/2023/CVE-2023-22458/README.md b/cve/redis/2023/CVE-2023-22458/README.md new file mode 100644 index 0000000000000000000000000000000000000000..f1018e382bbd7a17b832fadd0e82e99e88b1324d --- /dev/null +++ b/cve/redis/2023/CVE-2023-22458/README.md @@ -0,0 +1,3 @@ +Redis is an in-memory database that persists on disk. Authenticated users can issue a HRANDFIELD or ZRANDMEMBER command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newer up to but not including 6.2.9 as well as versions 7.0 up to but not including 7.0.8. Users are advised to upgrade. There are no known workarounds for this vulnerability. + +经过身份验证的用户可以发出带有特制参数的 HRANDFIELD 或 ZRANDMEMBER 命令,通过断言失败使 Redis 崩溃来触发拒绝服务。 此问题会影响 Redis 版本 6.2 或更高版本(但不包括 6.2.9)以及版本 7.0(但不包括 7.0.8), 建议用户升级。 此漏洞没有已知的解决方法。 diff --git a/cve/redis/2023/README.md b/cve/redis/2023/README.md new file mode 100644 index 0000000000000000000000000000000000000000..2433ebfa623a36f0bcb2074a51781c03ae8cf4e5 --- /dev/null +++ b/cve/redis/2023/README.md @@ -0,0 +1,3 @@ +Redis is an in-memory database that persists on disk. Authenticated users can issue a HRANDFIELD or ZRANDMEMBER command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newer up to but not including 6.2.9 as well as versions 7.0 up to but not including 7.0.8. Users are advised to upgrade. There are no known workarounds for this vulnerability. + +经过身份验证的用户可以发出带有特制参数的 HRANDFIELD 或 ZRANDMEMBER 命令,通过断言失败使 Redis 崩溃来触发拒绝服务。 此问题会影响 Redis 版本 6.2 或更高版本(但不包括 6.2.9)以及版本 7.0(但不包括 7.0.8), 建议用户升级。 此漏洞没有已知的解决方法