{"id":"MGASA-2021-0373","summary":"Updated redis package fixes security vulnerabilities","details":"An integer overflow bug in Redis version 6.0 or newer could be exploited using\nthe `STRALGO LCS` command to corrupt the heap and potentially result with\nremote code execution (CVE-2021-29477).\n\nAn integer overflow bug in Redis 6.2 before 6.2.3 could be exploited to corrupt\nthe heap and potentially result with remote code execution (CVE-2021-29478).\n\nA vulnerability involving out-of-bounds read and integer overflow to buffer\noverflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15\nand 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer\noverflow that can potentially be exploited to corrupt the heap, leak arbitrary\nheap contents or trigger remote code execution (CVE-2021-32761).\n","modified":"2026-04-16T04:41:43.841625270Z","published":"2021-07-25T14:45:06Z","upstream":["CVE-2021-29477","CVE-2021-29478","CVE-2021-32761"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0373.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=29036"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BPWBIZXA67JFIB63W2CNVVILCGIC2ME5/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI/"},{"type":"WEB","url":"https://www.debian.org/lts/security/2021/dla-2717"},{"type":"ADVISORY","url":"https://github.com/redis/redis/security/advisories/GHSA-8wxq-j7rp-g8wj"}],"affected":[{"package":{"name":"redis","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/redis?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"6.0.15-1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0373.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}