[Bugs] [Bug 13537] New: [CVE 21] hiredis 0.13.3 CVEs found

bugzilla bugzilla на rosalinux.ru
Ср Авг 23 23:20:30 MSK 2023


https://bugzilla.rosalinux.ru/show_bug.cgi?id=13537

          Platform: 2021.1
            Bug ID: 13537
           Summary: [CVE 21] hiredis 0.13.3  CVEs found
    Classification: ROSA-based products
           Product: ROSA Fresh
           Version: All
          Hardware: All
               URL: CVE-2021-32765,
                OS: Linux
            Status: CONFIRMED
          Severity: normal
          Priority: Normal
         Component: System (kernel, glibc, systemd, bash, PAM...)
          Assignee: bugs на lists.rosalinux.ru
          Reporter: y.tumanov на rosalinux.ru
        QA Contact: bugs на lists.rosalinux.ru
                CC: e.kosachev на rosalinux.ru, s.matveev на rosalinux.ru,
                    y.tumanov на rosalinux.ru
  Target Milestone: ---
             Flags: secteam_verified?

Please patch CVEs for package hiredis version 0.13.3

INFO (CVEs are): hiredis 0.13.3
 cves found
CVE-2021-32765
Desc: Hiredis is a minimalistic C client library for the Redis database. In
affected versions Hiredis is vulnurable to integer overflow if provided
maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing
`multi-bulk` (array-like) replies, hiredis fails to check if `count *
sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the
`calloc()` call doesn't itself make this check, it would result in a short
allocation and subsequent buffer overflow. Users of hiredis who are unable to
update may set the
[maxelements](https://github.com/redis/hiredis#reader-max-array-elements)
context option to a value small enough that no overflow is possible.
Link: https://nvd.nist.gov/vuln/detail/CVE-2021-32765
Severity: HIGH

-- 
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
----------- следущая часть -----------
Вложение в формате HTML было извлечено…
URL: <http://lists.rosalinux.ru/pipermail/bugs/attachments/20230823/03f9d64c/attachment-0001.html>


Подробная информация о списке рассылки Bugs