[Bugs] [Bug 13305] New: [CVE 21] redis 7.0.7 CVEs found
bugzilla
bugzilla на rosalinux.ru
Ср Май 3 17:02:17 MSK 2023
https://bugzilla.rosalinux.ru/show_bug.cgi?id=13305
Platform: 2021.1
Bug ID: 13305
Summary: [CVE 21] redis 7.0.7 CVEs found
Classification: ROSA-based products
Product: ROSA Fresh
Version: All
Hardware: All
URL: CVE-2022-35977, CVE-2022-36021, CVE-2022-3647,
CVE-2023-22458, CVE-2023-25155, CVE-2023-28856,
OS: Linux
Status: CONFIRMED
Severity: normal
Priority: Normal
Component: System (kernel, glibc, systemd, bash, PAM...)
Assignee: bugs на lists.rosalinux.ru
Reporter: y.tumanov на rosalinux.ru
QA Contact: bugs на lists.rosalinux.ru
CC: s.matveev на rosalinux.ru, y.tumanov на rosalinux.ru
Target Milestone: ---
Flags: secteam_verified?
Please patch CVEs for package redis version 7.0.7
INFO (CVEs are): redis 7.0.7
cves found
CVE-2022-35977
Desc: Redis is an in-memory database that persists on disk. Authenticated users
issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an
integer overflow, resulting with Redis attempting to allocate impossible
amounts of memory and abort with an out-of-memory (OOM) panic. The problem is
fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised to upgrade.
There are no known workarounds for this vulnerability.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-35977
Severity: MEDIUM
CVE-2022-36021
Desc: Redis is an in-memory database that persists on disk. Authenticated users
can use string matching commands (like `SCAN` or `KEYS`) with a specially
crafted pattern to trigger a denial-of-service attack on Redis, causing it to
hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18,
6.2.11, 7.0.9.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-36021
Severity: MEDIUM
CVE-2022-3647
Desc: ** DISPUTED ** A vulnerability, which was classified as problematic, was
found in Redis. Affected is the function sigsegvHandler of the file debug.c of
the component Crash Report. The manipulation leads to denial of service. The
real existence of this vulnerability is still doubted at the moment. The name
of the patch is 0bf90d944313919eb8e63d3588bf63a367f020a3. It is recommended to
apply a patch to fix this issue. VDB-211962 is the identifier assigned to this
vulnerability. NOTE: The vendor claims that this is not a DoS because it
applies to the crash logging mechanism which is triggered after a crash has
occurred.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-3647
Severity: LOW
CVE-2023-22458
Desc: Redis is an in-memory database that persists on disk. Authenticated users
can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted
arguments to trigger a denial-of-service by crashing Redis with an assertion
failure. This problem affects Redis versions 6.2 or newer up to but not
including 6.2.9 as well as versions 7.0 up to but not including 7.0.8. Users
are advised to upgrade. There are no known workarounds for this vulnerability.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-22458
Severity: MEDIUM
CVE-2023-25155
Desc: Redis is an in-memory database that persists on disk. Authenticated users
issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD`
commands can trigger an integer overflow, resulting in a runtime assertion and
termination of the Redis server process. This problem affects all Redis
versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-25155
Severity: MEDIUM
CVE-2023-28856
Desc: Redis is an open source, in-memory database that persists on disk.
Authenticated users can use the `HINCRBYFLOAT` command to create an invalid
hash field that will crash Redis on access in affected versions. This issue has
been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to
upgrade. There are no known workarounds for this issue.
Link: https://nvd.nist.gov/vuln/detail/CVE-2023-28856
Severity: MEDIUM
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
----------- следущая часть -----------
Вложение в формате HTML было извлечено…
URL: <http://lists.rosalinux.ru/pipermail/bugs/attachments/20230503/a9e016a2/attachment.html>
Подробная информация о списке рассылки Bugs