Advisories ยป MGASA-2021-0373

Updated redis package fixes security vulnerabilities

Publication date: 25 Jul 2021
Modification date: 25 Jul 2021
Type: security
Affected Mageia releases : 8
CVE: CVE-2021-29477 , CVE-2021-29478 , CVE-2021-32761

Description

An integer overflow bug in Redis version 6.0 or newer could be exploited using
the `STRALGO LCS` command to corrupt the heap and potentially result with
remote code execution (CVE-2021-29477).

An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt
the heap and potentially result with remote code execution (CVE-2021-29478).

A vulnerability involving out-of-bounds read and integer overflow to buffer
overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15
and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer
overflow that can potentially be exploited to corrupt the heap, leak arbitrary
heap contents or trigger remote code execution (CVE-2021-32761).
                

References

SRPMS

8/core