Bug ID 1191299
Summary VUL-0: CVE-2021-41099: redis: Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.3
Hardware Other
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee danilo.spinella@suse.com
Reporter Andreas.Stieger@gmx.de
QA Contact security-team@suse.de
Found By Security Response Team
Blocker ---

Fixed in Redis 6.2.6, 6.0.16 and 5.0.14

CVE-2021-41099: Integer to heap buffer overflow handling certain string
commands and network payloads, when proto-max-bulk-len is manually configured
to a non-default, very large value

References:
https://github.com/redis/redis/commit/24cc0b984d4ed5045c6ff125b0e619b6ce5ea9c6
https://groups.google.com/g/redis-db/c/GS_9L2KCk9g/m/Q7ZN1R1cDAAJ


You are receiving this mail because: