FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

redis -- multiple vulnerabilities

Affected packages
6.0.0 <= redis < 6.0.13
6.2.0 <= redis-devel < 6.2.3

Details

VuXML ID 1606b03b-ac57-11eb-9bdd-8c164567ca3c
Discovery 2021-05-03
Entry 2021-05-03

Redis project reports:

Vulnerability in the STRALGO LCS command
An integer overflow bug in Redis version 6.0 or newer could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution.
Vulnerability in the COPY command for large intsets
An integer overflow bug in Redis 6.2 could be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration value, creating a large set key that consists of integer values and using the COPY command to duplicate it. The integer overflow bug exists in all versions of Redis starting with 2.6, where it could result with a corrupted RDB or DUMP payload, but not exploited through COPY (which did not exist before 6.2).

References

CVE Name CVE-2021-29477
CVE Name CVE-2021-29478
URL https://groups.google.com/g/redis-db/c/6GSWzTW0PR8