aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSergey A. Osokin <osa@FreeBSD.org>2021-05-03 21:43:57 +0000
committerSergey A. Osokin <osa@FreeBSD.org>2021-05-03 21:44:51 +0000
commitf7743680c102e31388b1ea20a58dcded671a8746 (patch)
tree4704e174f6a7dbca055188e749fc1055a0434603
parent7d164ff37e8d9c929c8854db276499f87b98ad89 (diff)
downloadports-f7743680c102e31388b1ea20a58dcded671a8746.tar.gz
ports-f7743680c102e31388b1ea20a58dcded671a8746.zip
security/vuxml: document recent vulnerabilities with redis ports.
PR: 255580
-rw-r--r--security/vuxml/vuln.xml49
1 files changed, 49 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d1d1dc61ccfb..b1c8db06631f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,6 +76,55 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1606b03b-ac57-11eb-9bdd-8c164567ca3c">
+ <topic>redis -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>redis</name>
+ <range><ge>6.0.0</ge><lt>6.0.13</lt></range>
+ </package>
+ <package>
+ <name>redis-devel</name>
+ <range><ge>6.2.0</ge><lt>6.2.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Redis project reports:</p>
+ <blockquote cite="https://groups.google.com/g/redis-db/c/6GSWzTW0PR8">
+ <dl>
+ <dt>Vulnerability in the STRALGO LCS command</dt>
+ <dd>
+ An integer overflow bug in Redis version 6.0 or newer could be
+ exploited using the STRALGO LCS command to corrupt the heap and
+ potentially result with remote code execution.
+ </dd>
+ <dt>Vulnerability in the COPY command for large intsets</dt>
+ <dd>
+ An integer overflow bug in Redis 6.2 could be exploited to corrupt
+ the heap and potentially result with remote code execution.
+ The vulnerability involves changing the default set-max-intset-entries
+ configuration value, creating a large set key that consists of
+ integer values and using the COPY command to duplicate it.
+ The integer overflow bug exists in all versions of Redis starting
+ with 2.6, where it could result with a corrupted RDB or DUMP payload,
+ but not exploited through COPY (which did not exist before 6.2).
+ </dd>
+ </dl>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2021-29477</cvename>
+ <cvename>CVE-2021-29478</cvename>
+ <url>https://groups.google.com/g/redis-db/c/6GSWzTW0PR8</url>
+ </references>
+ <dates>
+ <discovery>2021-05-03</discovery>
+ <entry>2021-05-03</entry>
+ </dates>
+ </vuln>
+
<vuln vid="57027417-ab7f-11eb-9596-080027f515ea">
<topic>RDoc -- command injection vulnerability</topic>
<affects>