[Bug 1191300] New: VUL-0: CVE-2021-32762: redis: Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms
http://bugzilla.opensuse.org/show_bug.cgi?id=1191300 Bug ID: 1191300 Summary: VUL-0: CVE-2021-32762: redis: Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.3 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: danilo.spinella@suse.com Reporter: Andreas.Stieger@gmx.de QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- Fixed in Redis 6.2.6, 6.0.16 and 5.0.14 CVE-2021-32762: Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms References: https://github.com/redis/redis/commit/04ba485042c65e18a294a13202769cfa1f6714... https://groups.google.com/g/redis-db/c/GS_9L2KCk9g/m/Q7ZN1R1cDAAJ -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1191300 Andreas Stieger <Andreas.Stieger@gmx.de> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |michael@stroeder.com -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1191300 http://bugzilla.opensuse.org/show_bug.cgi?id=1191300#c1 --- Comment #1 from Michael Str�der <michael@stroeder.com> --- Update for Tumbleweed: https://build.opensuse.org/request/show/923120 -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com