Gentoo Archives: gentoo-announce

From: Thomas Deutschmann <whissi@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202103-02 ] Redis: Remote code execution
Date: Wed, 31 Mar 2021 12:27:10
Message-Id: 33a1092a-9f7e-9ed4-2a10-f3c0b46a652f@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202103-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Redis: Remote code execution
9 Date: March 31, 2021
10 Bugs: #773328
11 ID: 202103-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 A vulnerability in Redis could lead to remote code execution.
19
20 Background
21 ==========
22
23 Redis is an open source (BSD licensed), in-memory data structure store,
24 used as a database, cache and message broker.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 dev-db/redis < 6.0.12 >= 5.0.12
33 >= 6.0.12
34
35 Description
36 ===========
37
38 It was discovered that there were a number of integer overflow issues
39 in Redis.
40
41 Impact
42 ======
43
44 A remote attacker, able to connect to a Redis instance, could send a
45 malicious crafted large request possibly resulting in the execution of
46 arbitrary code with the privileges of the process or a Denial of
47 Service condition.
48
49 Workaround
50 ==========
51
52 There is no known workaround at this time.
53
54 Resolution
55 ==========
56
57 All Redis 5.x users should upgrade to the latest version:
58
59 # emerge --sync
60 # emerge --ask --oneshot --verbose ">=dev-db/redis-5.0.12"
61
62 All Redis 6.x users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=dev-db/redis-6.0.12"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2021-21309
71 https://nvd.nist.gov/vuln/detail/CVE-2021-21309
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 https://security.gentoo.org/glsa/202103-02
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users' machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 https://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2021 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
OpenPGP_signature.asc application/pgp-signature