MGASA-2021-0373

Source
https://advisories.mageia.org/MGASA-2021-0373.html
Import Source
https://advisories.mageia.org/MGASA-2021-0373.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0373
Related
Published
2021-07-25T14:45:06Z
Modified
2021-07-25T14:24:42Z
Summary
Updated redis package fixes security vulnerabilities
Details

An integer overflow bug in Redis version 6.0 or newer could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution (CVE-2021-29477).

An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution (CVE-2021-29478).

A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15 and 6.2.5. On 32-bit systems, Redis *BIT* command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution (CVE-2021-32761).

References
Credits

Affected packages