Integer Overflow or Wraparound Affecting redis-devel package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-REDISDEVEL-1952280
- published 26 Jul 2021
- disclosed 15 Jun 2020
Introduced: 15 Jun 2020
CVE-2020-14147 Open this link in a new tabHow to fix?
There is no fixed version for Centos:8 redis-devel.
NVD Description
Note: Versions mentioned in the description apply only to the upstream redis-devel package and not the redis-devel package as distributed by Centos.
See How to fix? for Centos:8 relevant fixed versions and status.
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
References
- https://access.redhat.com/security/cve/CVE-2020-14147
- https://www.debian.org/security/2020/dsa-4731
- https://security.gentoo.org/glsa/202008-17
- https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
- https://github.com/antirez/redis/pull/6875
- https://www.oracle.com/security-alerts/cpujan2021.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html