Bug 1191305 - (CVE-2021-32627) VUL-0: CVE-2021-32627,CVE-2021-32628: redis: Integer to heap buffer overflows
(CVE-2021-32627)
VUL-0: CVE-2021-32627,CVE-2021-32628: redis: Integer to heap buffer overflows
Status: IN_PROGRESS
Classification: openSUSE
Product: openSUSE Distribution
Classification: openSUSE
Component: Security
Leap 15.3
Other Other
: P3 - Medium : Normal (vote)
: ---
Assigned To: Security Team bot
Security Team bot
CVSSv3.1:SUSE:CVE-2021-32627:7.5:(AV:...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2021-10-04 20:58 UTC by Andreas Stieger
Modified: 2022-05-03 15:15 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2021-10-04 20:58:33 UTC
Fixed in Redis 6.2.6, 6.0.16 and 5.0.14

CVE-2021-32627: Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit

CVE-2021-32628: Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value


References:
https://github.com/redis/redis/commit/2775a3526e3e8bb040e72995231632c801977395
https://groups.google.com/g/redis-db/c/GS_9L2KCk9g/m/Q7ZN1R1cDAAJ
Comment 1 Michael Ströder 2021-10-04 21:18:21 UTC
Update for Tumbleweed: https://build.opensuse.org/request/show/923120
Comment 2 Danilo Spinella 2021-10-06 07:54:14 UTC
Fix for branch 6.0 (SLE has version 6.0.14):

https://github.com/redis/redis/commit/f6a40570fa63d5afdd596c78083d754081d80ae3
Comment 3 Danilo Spinella 2021-10-06 13:22:37 UTC
While updating to 6.0.16 would have been ideal to fix all the CVEs for redis (bsc#1191299, bsc#1191300, bsc#1191302, bsc#1191303, bsc#1191304, bsc#1191305, bsc#1191306), 6.0.15 introduces a small breaking change:

Change reply type for ZPOPMAX/MIN with count in RESP3 to nested array.
Was using a flat array like in RESP2 instead of a nested array like ZRANGE does.

https://github.com/redis/redis/releases/tag/6.0.15

Therefore I'd prefer to backport the changes manually.
Comment 6 Swamp Workflow Management 2021-11-23 20:18:37 UTC
SUSE-SU-2021:3772-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1191299,1191300,1191302,1191303,1191304,1191305,1191306
CVE References: CVE-2021-32626,CVE-2021-32627,CVE-2021-32628,CVE-2021-32672,CVE-2021-32675,CVE-2021-32687,CVE-2021-32762,CVE-2021-41099
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Server Applications 15-SP3 (src):    redis-6.0.14-6.8.1
SUSE Linux Enterprise Module for Server Applications 15-SP2 (src):    redis-6.0.14-6.8.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2021-11-23 20:34:37 UTC
openSUSE-SU-2021:3772-1: An update that fixes 8 vulnerabilities is now available.

Category: security (important)
Bug References: 1191299,1191300,1191302,1191303,1191304,1191305,1191306
CVE References: CVE-2021-32626,CVE-2021-32627,CVE-2021-32628,CVE-2021-32672,CVE-2021-32675,CVE-2021-32687,CVE-2021-32762,CVE-2021-41099
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    redis-6.0.14-6.8.1