diff options
author | Sergey A. Osokin <osa@FreeBSD.org> | 2021-05-03 21:43:57 +0000 |
---|---|---|
committer | Sergey A. Osokin <osa@FreeBSD.org> | 2021-05-03 21:44:51 +0000 |
commit | f7743680c102e31388b1ea20a58dcded671a8746 (patch) | |
tree | 4704e174f6a7dbca055188e749fc1055a0434603 | |
parent | 7d164ff37e8d9c929c8854db276499f87b98ad89 (diff) |
security/vuxml: document recent vulnerabilities with redis ports.
PR: 255580
-rw-r--r-- | security/vuxml/vuln.xml | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d1d1dc61ccfb..b1c8db06631f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,6 +76,55 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1606b03b-ac57-11eb-9bdd-8c164567ca3c"> + <topic>redis -- multiple vulnerabilities</topic> + <affects> + <package> + <name>redis</name> + <range><ge>6.0.0</ge><lt>6.0.13</lt></range> + </package> + <package> + <name>redis-devel</name> + <range><ge>6.2.0</ge><lt>6.2.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Redis project reports:</p> + <blockquote cite="https://groups.google.com/g/redis-db/c/6GSWzTW0PR8"> + <dl> + <dt>Vulnerability in the STRALGO LCS command</dt> + <dd> + An integer overflow bug in Redis version 6.0 or newer could be + exploited using the STRALGO LCS command to corrupt the heap and + potentially result with remote code execution. + </dd> + <dt>Vulnerability in the COPY command for large intsets</dt> + <dd> + An integer overflow bug in Redis 6.2 could be exploited to corrupt + the heap and potentially result with remote code execution. + The vulnerability involves changing the default set-max-intset-entries + configuration value, creating a large set key that consists of + integer values and using the COPY command to duplicate it. + The integer overflow bug exists in all versions of Redis starting + with 2.6, where it could result with a corrupted RDB or DUMP payload, + but not exploited through COPY (which did not exist before 6.2). + </dd> + </dl> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-29477</cvename> + <cvename>CVE-2021-29478</cvename> + <url>https://groups.google.com/g/redis-db/c/6GSWzTW0PR8</url> + </references> + <dates> + <discovery>2021-05-03</discovery> + <entry>2021-05-03</entry> + </dates> + </vuln> + <vuln vid="57027417-ab7f-11eb-9596-080027f515ea"> <topic>RDoc -- command injection vulnerability</topic> <affects> |