aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorYasuhiro Kimura <yasu@utahime.org>2021-07-27 10:24:10 +0000
committerLi-Wen Hsu <lwhsu@FreeBSD.org>2021-07-27 10:24:10 +0000
commitb40cccda5417dca36863966c90a3d1c7ac6e16e0 (patch)
tree90b8c918873b2a43d499e336b1756ac6f5ca819e
parentbb27dd504008c551d26afa3163cbdc0bcdeb7768 (diff)
downloadports-b40cccda5417dca36863966c90a3d1c7ac6e16e0.tar.gz
ports-b40cccda5417dca36863966c90a3d1c7ac6e16e0.zip
security/vuxml: Document integer overflow vulnerability in redis
PR: 257325
-rw-r--r--security/vuxml/vuln-2021.xml43
1 files changed, 43 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml
index d9889781f7f0..b74438a36a02 100644
--- a/security/vuxml/vuln-2021.xml
+++ b/security/vuxml/vuln-2021.xml
@@ -1,3 +1,46 @@
+ <vuln vid="c561ce49-eabc-11eb-9c3f-0800270512f4">
+ <topic>redis -- Integer overflow issues with BITFIELD command on 32-bit systems</topic>
+ <affects>
+ <package>
+ <name>redis</name>
+ <range><lt>6.0.15</lt></range>
+ </package>
+ <package>
+ <name>redis-devel</name>
+ <range><lt>6.2.5</lt></range>
+ </package>
+ <package>
+ <name>redis5</name>
+ <range><lt>5.0.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Huang Zhw reports:</p>
+ <blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj">
+ <p>
+ On 32-bit versions, Redis BITFIELD command is vulnerable to integer
+ overflow that can potentially be exploited to corrupt the heap,
+ leak arbitrary heap contents or trigger remote code execution.
+ The vulnerability involves constructing specially crafted bit
+ commands which overflow the bit offset.
+ </p>
+ <p>
+ This problem only affects 32-bit versions of Redis.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-32761</cvename>
+ <url>https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj</url>
+ </references>
+ <dates>
+ <discovery>2021-07-04</discovery>
+ <entry>2021-07-27</entry>
+ </dates>
+ </vuln>
+
<vuln vid="ce79167f-ee1c-11eb-9785-b42e99a1b9c3">
<topic>powerdns -- remotely triggered crash</topic>
<affects>