Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LCS fix for 32 bit #9011

Merged
merged 2 commits into from Jun 1, 2021
Merged

LCS fix for 32 bit #9011

merged 2 commits into from Jun 1, 2021

Conversation

oranagra
Copy link
Member

@oranagra oranagra commented May 31, 2021

This change also includes improved error handling for large string truncation and insufficient memory.

@oranagra oranagra requested a review from yossigo May 31, 2021 07:26
@oranagra oranagra merged commit 1ddecf1 into redis:unstable Jun 1, 2021
oranagra added a commit to oranagra/redis that referenced this pull request Jun 1, 2021
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477.

(cherry picked from commit 1ddecf1)
oranagra added a commit to oranagra/redis that referenced this pull request Jun 1, 2021
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477.

(cherry picked from commit 1ddecf1)
oranagra added a commit to oranagra/redis that referenced this pull request Jun 1, 2021
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477.

(cherry picked from commit 1ddecf1)
oranagra added a commit to oranagra/redis that referenced this pull request Jun 1, 2021
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477.

(cherry picked from commit 1ddecf1)
oranagra added a commit that referenced this pull request Jun 1, 2021
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477.

(cherry picked from commit 1ddecf1)
oranagra added a commit that referenced this pull request Jun 1, 2021
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477.

(cherry picked from commit 1ddecf1)
JackieXie168 pushed a commit to JackieXie168/redis that referenced this pull request Sep 8, 2021
An integer overflow bug in Redis version 6.0 or newer can be exploited using the
STRALGO LCS command to corrupt the heap and potentially result with remote code
execution. This is a result of an incomplete fix by CVE-2021-29477.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants