Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. Redis is an in-memory database that persists on disk. Improved mac address string descriptor length validation to check for unexpectedly small values may be used as a workaround. The fix has been included in USBX release (). This may allow one to redirect the code execution flow or introduce a denial of service. ![]() ![]() ![]() *This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (``) is enabled.* This vulnerability affects Firefox ux_host_class_cdc_ecm_node_id` array. In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |