Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2:2.8.4-2ubuntu0.2", "binary_name": "redis-server" }, { "binary_version": "2:2.8.4-2ubuntu0.2", "binary_name": "redis-server-dbgsym" }, { "binary_version": "2:2.8.4-2ubuntu0.2", "binary_name": "redis-tools" }, { "binary_version": "2:2.8.4-2ubuntu0.2", "binary_name": "redis-tools-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2:3.0.6-1", "binary_name": "redis-sentinel" }, { "binary_version": "2:3.0.6-1", "binary_name": "redis-server" }, { "binary_version": "2:3.0.6-1", "binary_name": "redis-server-dbgsym" }, { "binary_version": "2:3.0.6-1", "binary_name": "redis-tools" }, { "binary_version": "2:3.0.6-1", "binary_name": "redis-tools-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5:4.0.9-1", "binary_name": "redis" }, { "binary_version": "5:4.0.9-1", "binary_name": "redis-sentinel" }, { "binary_version": "5:4.0.9-1", "binary_name": "redis-server" }, { "binary_version": "5:4.0.9-1", "binary_name": "redis-tools" }, { "binary_version": "5:4.0.9-1", "binary_name": "redis-tools-dbgsym" } ] }