Date: Mon, 3 May 2021 21:45:01 GMT From: "Sergey A. Osokin" <osa@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: f7743680c102 - main - security/vuxml: document recent vulnerabilities with redis ports. PR: 255580 Message-ID: <202105032145.143Lj1AL053797@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by osa: URL: https://cgit.FreeBSD.org/ports/commit/?id=f7743680c102e31388b1ea20a58dcded671a8746 commit f7743680c102e31388b1ea20a58dcded671a8746 Author: Sergey A. Osokin <osa@FreeBSD.org> AuthorDate: 2021-05-03 21:43:57 +0000 Commit: Sergey A. Osokin <osa@FreeBSD.org> CommitDate: 2021-05-03 21:44:51 +0000 security/vuxml: document recent vulnerabilities with redis ports. PR: 255580 --- security/vuxml/vuln.xml | 49 +++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 49 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index d1d1dc61ccfb..b1c8db06631f 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -76,6 +76,55 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1606b03b-ac57-11eb-9bdd-8c164567ca3c"> + <topic>redis -- multiple vulnerabilities</topic> + <affects> + <package> + <name>redis</name> + <range><ge>6.0.0</ge><lt>6.0.13</lt></range> + </package> + <package> + <name>redis-devel</name> + <range><ge>6.2.0</ge><lt>6.2.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Redis project reports:</p> + <blockquote cite="https://groups.google.com/g/redis-db/c/6GSWzTW0PR8"> + <dl> + <dt>Vulnerability in the STRALGO LCS command</dt> + <dd> + An integer overflow bug in Redis version 6.0 or newer could be + exploited using the STRALGO LCS command to corrupt the heap and + potentially result with remote code execution. + </dd> + <dt>Vulnerability in the COPY command for large intsets</dt> + <dd> + An integer overflow bug in Redis 6.2 could be exploited to corrupt + the heap and potentially result with remote code execution. + The vulnerability involves changing the default set-max-intset-entries + configuration value, creating a large set key that consists of + integer values and using the COPY command to duplicate it. + The integer overflow bug exists in all versions of Redis starting + with 2.6, where it could result with a corrupted RDB or DUMP payload, + but not exploited through COPY (which did not exist before 6.2). + </dd> + </dl> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-29477</cvename> + <cvename>CVE-2021-29478</cvename> + <url>https://groups.google.com/g/redis-db/c/6GSWzTW0PR8</url> + </references> + <dates> + <discovery>2021-05-03</discovery> + <entry>2021-05-03</entry> + </dates> + </vuln> + <vuln vid="57027417-ab7f-11eb-9596-080027f515ea"> <topic>RDoc -- command injection vulnerability</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202105032145.143Lj1AL053797>