Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "redis-server", "binary_version": "2:2.8.4-2ubuntu0.2" }, { "binary_name": "redis-server-dbgsym", "binary_version": "2:2.8.4-2ubuntu0.2" }, { "binary_name": "redis-tools", "binary_version": "2:2.8.4-2ubuntu0.2" }, { "binary_name": "redis-tools-dbgsym", "binary_version": "2:2.8.4-2ubuntu0.2" } ] }
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "redis-sentinel", "binary_version": "2:3.0.6-1" }, { "binary_name": "redis-server", "binary_version": "2:3.0.6-1" }, { "binary_name": "redis-server-dbgsym", "binary_version": "2:3.0.6-1" }, { "binary_name": "redis-tools", "binary_version": "2:3.0.6-1" }, { "binary_name": "redis-tools-dbgsym", "binary_version": "2:3.0.6-1" } ] }
{ "ubuntu_priority": "medium", "availability": "No subscription required", "binaries": [ { "binary_name": "redis", "binary_version": "5:4.0.9-1" }, { "binary_name": "redis-sentinel", "binary_version": "5:4.0.9-1" }, { "binary_name": "redis-server", "binary_version": "5:4.0.9-1" }, { "binary_name": "redis-tools", "binary_version": "5:4.0.9-1" }, { "binary_name": "redis-tools-dbgsym", "binary_version": "5:4.0.9-1" } ] }