Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 May 2021 21:45:01 GMT
From:      "Sergey A. Osokin" <osa@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: f7743680c102 - main - security/vuxml: document recent vulnerabilities with redis ports. PR:	255580
Message-ID:  <202105032145.143Lj1AL053797@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by osa:

URL: https://cgit.FreeBSD.org/ports/commit/?id=f7743680c102e31388b1ea20a58dcded671a8746

commit f7743680c102e31388b1ea20a58dcded671a8746
Author:     Sergey A. Osokin <osa@FreeBSD.org>
AuthorDate: 2021-05-03 21:43:57 +0000
Commit:     Sergey A. Osokin <osa@FreeBSD.org>
CommitDate: 2021-05-03 21:44:51 +0000

    security/vuxml: document recent vulnerabilities with redis ports.
    PR:     255580
---
 security/vuxml/vuln.xml | 49 +++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 49 insertions(+)

diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index d1d1dc61ccfb..b1c8db06631f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,6 +76,55 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="1606b03b-ac57-11eb-9bdd-8c164567ca3c">
+    <topic>redis -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>redis</name>
+	<range><ge>6.0.0</ge><lt>6.0.13</lt></range>
+      </package>
+      <package>
+	<name>redis-devel</name>
+	<range><ge>6.2.0</ge><lt>6.2.3</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Redis project reports:</p>
+	<blockquote cite="https://groups.google.com/g/redis-db/c/6GSWzTW0PR8">;
+	  <dl>
+	    <dt>Vulnerability in the STRALGO LCS command</dt>
+	    <dd>
+	      An integer overflow bug in Redis version 6.0 or newer could be
+	      exploited using the STRALGO LCS command to corrupt the heap and
+	      potentially result with remote code execution.
+	    </dd>
+	    <dt>Vulnerability in the COPY command for large intsets</dt>
+	    <dd>
+	      An integer overflow bug in Redis 6.2 could be exploited to corrupt
+	      the heap and potentially result with remote code execution.
+	      The vulnerability involves changing the default set-max-intset-entries
+	      configuration value, creating a large set key that consists of
+	      integer values and using the COPY command to duplicate it.
+	      The integer overflow bug exists in all versions of Redis starting
+	      with 2.6, where it could result with a corrupted RDB or DUMP payload,
+	      but not exploited through COPY (which did not exist before 6.2).
+	    </dd>
+	  </dl>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2021-29477</cvename>
+      <cvename>CVE-2021-29478</cvename>
+      <url>https://groups.google.com/g/redis-db/c/6GSWzTW0PR8</url>;
+    </references>
+    <dates>
+      <discovery>2021-05-03</discovery>
+      <entry>2021-05-03</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="57027417-ab7f-11eb-9596-080027f515ea">
     <topic>RDoc -- command injection vulnerability</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202105032145.143Lj1AL053797>