aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChris Lamb <lamby@debian.org>2021-10-12 11:22:44 +0100
committerChris Lamb <lamby@debian.org>2021-10-12 11:22:44 +0100
commitc096e43b6dfec618a46b1c5a03f256dcfa373b03 (patch)
tree5a33e0409916eff32f703c02a26298e7ea1b388a
parent43e7d95e58c7dc23893d48e80df7039b92bfac72 (diff)
Add DLA-2783-1.
-rw-r--r--english/lts/security/2021/dla-2783.data9
-rw-r--r--english/lts/security/2021/dla-2783.wml38
2 files changed, 47 insertions, 0 deletions
diff --git a/english/lts/security/2021/dla-2783.data b/english/lts/security/2021/dla-2783.data
new file mode 100644
index 00000000000..eb7eb76303a
--- /dev/null
+++ b/english/lts/security/2021/dla-2783.data
@@ -0,0 +1,9 @@
+<define-tag pagetitle>DLA-2783-1 hiredis</define-tag>
+<define-tag report_date>2021-10-12</define-tag>
+<define-tag secrefs>CVE-2021-32765</define-tag>
+<define-tag packages>hiredis</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
diff --git a/english/lts/security/2021/dla-2783.wml b/english/lts/security/2021/dla-2783.wml
new file mode 100644
index 00000000000..74e01016534
--- /dev/null
+++ b/english/lts/security/2021/dla-2783.wml
@@ -0,0 +1,38 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+
+<p>It was discovered that there was an integer-overflow vulnerability in
+hiredis, a C client library for communicating with Redis databases. This
+occurred within the handling and parsing of 'multi-bulk' replies.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2021-32765">CVE-2021-32765</a>
+
+ <p>Hiredis is a minimalistic C client library for the Redis database. In
+ affected versions Hiredis is vulnurable to integer overflow if provided
+ maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When
+ parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count
+ * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and
+ the `calloc()` call doesn't itself make this check, it would result in a
+ short allocation and subsequent buffer overflow. Users of hiredis who are
+ unable to update may set the
+ [maxelements](https://github.com/redis/hiredis#reader-max-array-elements)
+ context option to a value small enough that no overflow is
+ possible.</p></li>
+
+</ul>
+
+<p>For Debian 9 <q>Stretch</q>, these problems have been fixed in version
+0.13.3-1+deb9u1.</p>
+
+<p>We recommend that you upgrade your hiredis packages.</p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2021/dla-2783.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy