CVE-2021-29478 - log back

CVE-2021-29478 edited at 04 May 2021 17:48:48
Severity
- Medium
+ High
CVE-2021-29478 edited at 04 May 2021 17:47:44
Description
- An integer overflow bug in Redis 6.2 could be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration value, creating a large set key that consists of integer values and using the COPY command to duplicate it. The integer overflow bug exists in all versions of Redis starting with 2.6, where it could result with a corrupted RDB or DUMP payload, but not exploited through COPY (which did not exist before 6.2). The issue is fixed in Redis version 6.2.3.
+ An integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt the heap and potentially result with remote code execution. Redis 6.0 and earlier are not directly affected by this issue. The problem is fixed in version 6.2.3. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from modifying the set-max-intset-entries configuration parameter. This can be done using ACL to restrict unprivileged users from using the "CONFIG SET" command.
References
- https://groups.google.com/g/redis-db/c/6GSWzTW0PR8/m/8FbdIEEoBAAJ
+ https://github.com/redis/redis/security/advisories/GHSA-qh52-crrg-44g3
https://github.com/redis/redis/commit/046352069396fe3be0a50ca505cb65af15c0d995
CVE-2021-29478 edited at 04 May 2021 09:51:43
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Remote
Type
- Unknown
+ Arbitrary code execution
Description
+ An integer overflow bug in Redis 6.2 could be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration value, creating a large set key that consists of integer values and using the COPY command to duplicate it. The integer overflow bug exists in all versions of Redis starting with 2.6, where it could result with a corrupted RDB or DUMP payload, but not exploited through COPY (which did not exist before 6.2). The issue is fixed in Redis version 6.2.3.
References
+ https://groups.google.com/g/redis-db/c/6GSWzTW0PR8/m/8FbdIEEoBAAJ
+ https://github.com/redis/redis/commit/046352069396fe3be0a50ca505cb65af15c0d995
Notes
CVE-2021-29478 created at 04 May 2021 09:48:29