Bug 27881

Summary: redis security issue CVE-2020-14147
Product: Mageia Reporter: Zombie Ryushu <zombie_ryushu>
Component: SecurityAssignee: Mageia Bug Squad <bugsquad>
Status: RESOLVED DUPLICATE QA Contact: Sec team <security>
Severity: normal    
Priority: Normal    
Version: 7   
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: https://nvd.nist.gov/vuln/detail/CVE-2020-14147
Whiteboard:
Source RPM: redis-5.0.9-1.mga7.src CVE: CVE-2020-14147
Status comment:

Description Zombie Ryushu 2020-12-19 22:04:33 CET
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
Zombie Ryushu 2020-12-19 22:04:54 CET

CVE: (none) => CVE-2020-14147

Comment 1 David Walser 2020-12-19 23:52:21 CET
Already reported and FIXED!

*** This bug has been marked as a duplicate of bug 26978 ***

Resolution: (none) => DUPLICATE
Status: NEW => RESOLVED