Bug ID | 1191299 |
---|---|
Summary | VUL-0: CVE-2021-41099: redis: Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.3 |
Hardware | Other |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | danilo.spinella@suse.com |
Reporter | Andreas.Stieger@gmx.de |
QA Contact | security-team@suse.de |
Found By | Security Response Team |
Blocker | --- |
Fixed in Redis 6.2.6, 6.0.16 and 5.0.14 CVE-2021-41099: Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value References: https://github.com/redis/redis/commit/24cc0b984d4ed5045c6ff125b0e619b6ce5ea9c6 https://groups.google.com/g/redis-db/c/GS_9L2KCk9g/m/Q7ZN1R1cDAAJ