Bug 27881 - redis security issue CVE-2020-14147
Summary: redis security issue CVE-2020-14147
Status: RESOLVED DUPLICATE of bug 26978
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 7
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact: Sec team
URL: https://nvd.nist.gov/vuln/detail/CVE-...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2020-12-19 22:04 CET by Zombie Ryushu
Modified: 2020-12-19 23:52 CET (History)
0 users

See Also:
Source RPM: redis-5.0.9-1.mga7.src
CVE: CVE-2020-14147
Status comment:


Attachments

Description Zombie Ryushu 2020-12-19 22:04:33 CET
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
Zombie Ryushu 2020-12-19 22:04:54 CET

CVE: (none) => CVE-2020-14147

Comment 1 David Walser 2020-12-19 23:52:21 CET
Already reported and FIXED!

*** This bug has been marked as a duplicate of bug 26978 ***

Resolution: (none) => DUPLICATE
Status: NEW => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.