Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2021.0483
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2021-0483)
Zusammenfassung:The remote host is missing an update for the 'redis' package(s) announced via the MGASA-2021-0483 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'redis' package(s) announced via the MGASA-2021-0483 advisory.

Vulnerability Insight:
CVE-2021-32626: Specially crafted Lua scripts executing in Redis can cause
the heap-based Lua stack to be overflowed, due to incomplete checks for this
condition. This can result with heap corruption and potentially remote code
execution.
CVE-2021-32627: An integer overflow bug in Redis 5.0 or newer can be exploited
to corrupt the heap and potentially result with remote code execution.
CVE-2021-32628: An integer overflow bug in the ziplist data structure used by
all versions of Redis can be exploited to corrupt the heap and potentially
result with remote code execution.
CVE-2021-32672: When using the Redis Lua Debugger, users can send malformed
requests that cause the debugger's protocol parser to read data beyond the
actual buffer.
CVE-2021-32675: When parsing an incoming Redis Standard Protocol (RESP)
request, Redis allocates memory according to user-specified values which
determine the number of elements (in the multi-bulk header) and size of each
element (in the bulk header).
CVE-2021-32687: An integer overflow bug affecting all versions of Redis can
be exploited to corrupt the heap and potentially be used to leak arbitrary
contents of the heap or trigger remote code execution.
CVE-2021-32762: The redis-cli command line tool and redis-sentinel service
may be vulnerable to integer overflow when parsing specially crafted large
multi-bulk network replies.
CVE-2021-41099: An integer overflow bug in the underlying string library can
be used to corrupt the heap and potentially result with denial of service or
remote code execution.

Affected Software/OS:
'redis' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-32626
https://github.com/redis/redis/security/advisories/GHSA-p486-xggp-782c
https://security.netapp.com/advisory/ntap-20211104-0003/
Debian Security Information: DSA-5001 (Google Search)
https://www.debian.org/security/2021/dsa-5001
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/
https://security.gentoo.org/glsa/202209-17
https://github.com/redis/redis/commit/666ed7facf4524bf6d19b11b20faa2cf93fdf591
https://www.oracle.com/security-alerts/cpuapr2022.html
https://lists.apache.org/thread.html/r75490c61c2cb7b6ae2c81238fd52ae13636c60435abcd732d41531a0@%3Ccommits.druid.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2021-32627
https://github.com/redis/redis/security/advisories/GHSA-f434-69fm-g45v
https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3
Common Vulnerability Exposure (CVE) ID: CVE-2021-32628
https://github.com/redis/redis/security/advisories/GHSA-vw22-qm3h-49pr
Common Vulnerability Exposure (CVE) ID: CVE-2021-32672
https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm
https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd
Common Vulnerability Exposure (CVE) ID: CVE-2021-32675
https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p
https://github.com/redis/redis/commit/5674b0057ff2903d43eaff802017eddf37c360f8
https://lists.apache.org/thread.html/ra603ff6e04549d7f290f61f9b11e2d2e4dba693b05ff053f4ec6bc47@%3Cnotifications.geode.apache.org%3E
Common Vulnerability Exposure (CVE) ID: CVE-2021-32687
https://github.com/redis/redis/security/advisories/GHSA-m3mf-8x9w-r27q
https://github.com/redis/redis/commit/a30d367a71b7017581cf1ca104242a3c644dec0f
Common Vulnerability Exposure (CVE) ID: CVE-2021-32762
https://github.com/redis/redis/security/advisories/GHSA-833w-8v3m-8wwr
https://github.com/redis/redis/commit/0215324a66af949be39b34be2d55143232c1cb71
Common Vulnerability Exposure (CVE) ID: CVE-2021-41099
https://github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph
https://github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.