View | Details | Raw Unified | Return to bug 263648
Collapse All | Expand All

(-)b/security/vuxml/vuln-2022.xml (+30 lines)
Lines 1-3 Link Here
1
  <vuln vid="2220827b-c732-11ec-b272-901b0e934d69">
2
    <topic>hiredis -- integer/buffer overflow</topic>
3
    <affects>
4
      <package>
5
	<name>hiredis</name>
6
	<range><lt>1.0.1</lt></range>
7
      </package>
8
    </affects>
9
    <description>
10
      <body xmlns="http://www.w3.org/1999/xhtml">
11
	<p>hiredis maintainers report:</p>
12
	<blockquote cite="INSERT URL HERE">
13
	  <p>
14
	    Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted RESP mult-bulk protocol data.
15
16
	    When parsing multi-bulk (array-like) replies, hiredis fails to check if count * sizeof(redisReply*) can be represented in SIZE_MAX. If it can not, and the calloc() call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow.</p>
17
	</blockquote>
18
      </body>
19
    </description>
20
    <references>
21
      <cvename>CVE-2021-32765</cvename>
22
      <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32765</url>
23
      <url>https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2</url>
24
    </references>
25
    <dates>
26
      <discovery>2021-10-04</discovery>
27
      <entry>2022-04-28</entry>
28
    </dates>
29
  </vuln>
30
1
  <vuln vid="92a4d881-c6cf-11ec-a06f-d4c9ef517024">
31
  <vuln vid="92a4d881-c6cf-11ec-a06f-d4c9ef517024">
2
    <topic>cURL -- Multiple vulnerabilities</topic>
32
    <topic>cURL -- Multiple vulnerabilities</topic>
3
    <affects>
33
    <affects>

Return to bug 263648