Bug 1191305 (CVE-2021-32627)

Summary: VUL-0: CVE-2021-32627,CVE-2021-32628: redis: Integer to heap buffer overflows
Product: [openSUSE] openSUSE Distribution Reporter: Andreas Stieger <Andreas.Stieger>
Component: SecurityAssignee: Security Team bot <security-team>
Status: IN_PROGRESS --- QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: michael
Version: Leap 15.3   
Target Milestone: ---   
Hardware: Other   
OS: Other   
Whiteboard: CVSSv3.1:SUSE:CVE-2021-32627:7.5:(AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) CVSSv3.1:SUSE:CVE-2021-32628:7.5:(AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Andreas Stieger 2021-10-04 20:58:33 UTC
Fixed in Redis 6.2.6, 6.0.16 and 5.0.14

CVE-2021-32627: Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit

CVE-2021-32628: Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value


References:
https://github.com/redis/redis/commit/2775a3526e3e8bb040e72995231632c801977395
https://groups.google.com/g/redis-db/c/GS_9L2KCk9g/m/Q7ZN1R1cDAAJ
Comment 1 Michael Ströder 2021-10-04 21:18:21 UTC
Update for Tumbleweed: https://build.opensuse.org/request/show/923120
Comment 2 Danilo Spinella 2021-10-06 07:54:14 UTC
Fix for branch 6.0 (SLE has version 6.0.14):

https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3
Comment 3 Danilo Spinella 2021-10-06 13:22:37 UTC
While updating to 6.0.16 would have been ideal to fix all the CVEs for redis (bsc#1191299, bsc#1191300, bsc#1191302, bsc#1191303, bsc#1191304, bsc#1191305, bsc#1191306), 6.0.15 introduces a small breaking change:

Change reply type for ZPOPMAX/MIN with count in RESP3 to nested array.
Was using a flat array like in RESP2 instead of a nested array like ZRANGE does.

https://github.com/redis/redis/releases/tag/6.0.15

Therefore I'd prefer to backport the changes manually.
Comment 6 Swamp Workflow Management 2021-11-23 20:18:37 UTC
SUSE-SU-2021:3772-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1191299,1191300,1191302,1191303,1191304,1191305,1191306
CVE References: CVE-2021-32626,CVE-2021-32627,CVE-2021-32628,CVE-2021-32672,CVE-2021-32675,CVE-2021-32687,CVE-2021-32762,CVE-2021-41099
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    redis-6.0.14-6.8.1
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    redis-6.0.14-6.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2021-11-23 20:34:37 UTC
openSUSE-SU-2021:3772-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1191299,1191300,1191302,1191303,1191304,1191305,1191306
CVE References: CVE-2021-32626,CVE-2021-32627,CVE-2021-32628,CVE-2021-32672,CVE-2021-32675,CVE-2021-32687,CVE-2021-32762,CVE-2021-41099
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    redis-6.0.14-6.8.1