FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

redis -- multiple vulnerabilities

Affected packages
redis-devel < 7.0.0.20211005
redis < 6.2.6
redis6 < 6.0.16
redis5 < 5.0.14

Details

VuXML ID 9b4806c1-257f-11ec-9db5-0800270512f4
Discovery 2021-10-04
Entry 2021-10-05

The Redis Team reports:

CVE-2021-41099
Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured.
CVE-2021-32762
Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms.
CVE-2021-32687
Integer to heap buffer overflow with intsets, when set-max-intset-entries is manually configured to a non-default, very large value.
CVE-2021-32675
Denial Of Service when processing RESP request payloads with a large number of elements on many connections.
CVE-2021-32672
Random heap reading issue with Lua Debugger.
CVE-2021-32628
Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value.
CVE-2021-32627
Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit.
CVE-2021-32626
Specially crafted Lua scripts may result with Heap buffer overflow.

References

CVE Name CVE-2021-32626
CVE Name CVE-2021-32627
CVE Name CVE-2021-32628
CVE Name CVE-2021-32672
CVE Name CVE-2021-32675
CVE Name CVE-2021-32687
CVE Name CVE-2021-32762
CVE Name CVE-2021-41099
URL https://groups.google.com/g/redis-db/c/GS_9L2KCk9g