ALT-BU-2021-4009-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2021-03165
Уязвимость программного интерфейса "защиты" страницы программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2021-03167
Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, связанная с недостатками процедуры аутентификации, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2021-03168
Уязвимость функции ContentModelChange программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2021-03170
Уязвимость функций MovePage::isValidMoveTarget(), Title::getArticleID(), MovePage::moveToInternal() программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2021-03171
Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовый скриптинг
BDU:2021-03173
Уязвимость функции SMLLexer библиотеки Pygments, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03174
Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2021-03741
Уязвимость программы подсветки синтаксиса Pygments, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04474
Уязвимость расширения Oauth программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01787
Уязвимость программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-35622
An issue was discovered in the GlobalUsage extension for MediaWiki through 1.35.1. SpecialGlobalUsage.php calls WikiMap::makeForeignLink unsafely. The $page variable within the formatItem function was not being properly escaped, allowing for XSS under certain conditions.
Modified: 2024-11-21
CVE-2020-35623
An issue was discovered in the CasAuth extension for MediaWiki through 1.35.1. Due to improper username validation, it allowed user impersonation with trivial manipulations of certain characters within a given username. An ordinary user may be able to login as a "bureaucrat user" who has a similar username, as demonstrated by usernames that differ only in (1) bidirectional override symbols or (2) blank space.
Modified: 2024-11-21
CVE-2020-35624
An issue was discovered in the SecurePoll extension for MediaWiki through 1.35.1. The non-admin vote list contains a full vote timestamp, which may provide unintended clues about how a voting process unfolded.
Modified: 2024-11-21
CVE-2020-35625
An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment.
Modified: 2024-11-21
CVE-2020-35626
An issue was discovered in the PushToWatch extension for MediaWiki through 1.35.1. The primary form did not implement an anti-CSRF token and therefore was completely vulnerable to CSRF attacks against onSkinAddFooterLinks in PushToWatch.php.
Modified: 2024-11-21
CVE-2021-20270
An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.
- https://bugzilla.redhat.com/show_bug.cgi?id=1922136
- https://bugzilla.redhat.com/show_bug.cgi?id=1922136
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- DSA-4889
- DSA-4889
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-27291
In pygments 1.1+, fixed in 2.7.4, the lexers used to parse programming languages rely heavily on regular expressions. Some of the regular expressions have exponential or cubic worst-case complexity and are vulnerable to ReDoS. By crafting malicious input, an attacker can cause a denial of service.
- https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce
- https://gist.github.com/b-c-ds/b1a2cc0c68a35c57188575eb496de5ce
- https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14
- https://github.com/pygments/pygments/commit/2e7e8c4a7b318f4032493773732754e418279a14
- [debian-lts-announce] 20210319 [SECURITY] [DLA 2600-1] pygments security update
- [debian-lts-announce] 20210319 [SECURITY] [DLA 2600-1] pygments security update
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- FEDORA-2021-166dfc62b2
- FEDORA-2021-166dfc62b2
- FEDORA-2021-3f975f68c8
- FEDORA-2021-3f975f68c8
- DSA-4878
- DSA-4878
- DSA-4889
- DSA-4889
Modified: 2024-11-21
CVE-2021-30152
An issue was discovered in MediaWiki before 1.31.13 and 1.32.x through 1.35.x before 1.35.2. When using the MediaWiki API to "protect" a page, a user is currently able to protect to a higher level than they currently have permissions for.
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- FEDORA-2021-f4223b6684
- FEDORA-2021-f4223b6684
- FEDORA-2021-d298103d3a
- FEDORA-2021-d298103d3a
- https://phabricator.wikimedia.org/T270713
- https://phabricator.wikimedia.org/T270713
- GLSA-202107-40
- GLSA-202107-40
- DSA-4889
- DSA-4889
Modified: 2025-02-06
CVE-2021-30153
An issue was discovered in the VisualEditor extension in MediaWiki before 1.31.13, and 1.32.x through 1.35.x before 1.35.2. . When using VisualEditor to edit a MediaWiki user page belonging to an existing, but hidden, user, VisualEditor will disclose that the user exists. (It shouldn't because they are hidden.) This is related to ApiVisualEditor.
- https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/message/XYBF5RSTJRMVCP7QBYK7643W75A3KCIY/
- https://lists.wikimedia.org/hyperkitty/list/wikitech-l%40lists.wikimedia.org/message/XYBF5RSTJRMVCP7QBYK7643W75A3KCIY/
- https://lists.wikimedia.org/pipermail/wikitech-l/2021-April/094418.html
- https://lists.wikimedia.org/pipermail/wikitech-l/2021-April/094418.html
- https://phabricator.wikimedia.org/T270453
- https://phabricator.wikimedia.org/T270453
Modified: 2024-11-21
CVE-2021-30154
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On Special:NewFiles, all the mediastatistics-header-* messages are output in HTML unescaped, leading to XSS.
Modified: 2024-11-21
CVE-2021-30155
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. ContentModelChange does not check if a user has correct permissions to create and set the content model of a nonexistent page.
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- FEDORA-2021-f4223b6684
- FEDORA-2021-f4223b6684
- FEDORA-2021-d298103d3a
- FEDORA-2021-d298103d3a
- https://phabricator.wikimedia.org/T270988
- https://phabricator.wikimedia.org/T270988
- GLSA-202107-40
- GLSA-202107-40
- DSA-4889
- DSA-4889
Modified: 2024-11-21
CVE-2021-30156
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Special:Contributions can leak that a "hidden" user exists.
Modified: 2024-11-21
CVE-2021-30157
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. On ChangesList special pages such as Special:RecentChanges and Special:Watchlist, some of the rcfilters-filter-* label messages are output in HTML unescaped, leading to XSS.
Modified: 2024-11-21
CVE-2021-30158
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Blocked users are unable to use Special:ResetTokens. This has security relevance because a blocked user might have accidentally shared a token, or might know that a token has been compromised, and yet is not able to block any potential future use of the token by an unauthorized party.
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- FEDORA-2021-f4223b6684
- FEDORA-2021-f4223b6684
- FEDORA-2021-d298103d3a
- FEDORA-2021-d298103d3a
- https://phabricator.wikimedia.org/T277009
- https://phabricator.wikimedia.org/T277009
- GLSA-202107-40
- GLSA-202107-40
- DSA-4889
- DSA-4889
Modified: 2024-11-21
CVE-2021-30159
An issue was discovered in MediaWiki before 1.31.12 and 1.32.x through 1.35.x before 1.35.2. Users can bypass intended restrictions on deleting pages in certain "fast double move" situations. MovePage::isValidMoveTarget() uses FOR UPDATE, but it's only called if Title::getArticleID() returns non-zero with no special flags. Next, MovePage::moveToInternal() will delete the page if getArticleID(READ_LATEST) is non-zero. Therefore, if the page is missing in the replica DB, isValidMove() will return true, and then moveToInternal() will unconditionally delete the page if it can be found in the master.
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
- FEDORA-2021-f4223b6684
- FEDORA-2021-f4223b6684
- FEDORA-2021-d298103d3a
- FEDORA-2021-d298103d3a
- https://phabricator.wikimedia.org/T272386
- https://phabricator.wikimedia.org/T272386
- GLSA-202107-40
- GLSA-202107-40
- DSA-4889
- DSA-4889
Modified: 2024-11-21
CVE-2021-30458
An issue was discovered in Wikimedia Parsoid before 0.11.1 and 0.12.x before 0.12.2. An attacker can send crafted wikitext that Utils/WTUtils.php will transform by using a tag, bypassing sanitization steps, and potentially allowing for XSS.
Modified: 2024-11-21
CVE-2021-31545
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The page_recent_contributors leaked the existence of certain deleted MediaWiki usernames, related to rev_deleted.
Modified: 2024-11-21
CVE-2021-31546
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly logged sensitive suppression deletions, which should not have been visible to users with access to view AbuseFilter log data.
Modified: 2024-11-21
CVE-2021-31547
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. Its AbuseFilterCheckMatch API reveals suppressed edits and usernames to unprivileged users through the iteration of crafted AbuseFilter rules.
- https://gerrit.wikimedia.org/r/q/I3f7dbd8b873d411e37c8c3aac2339bf5ec36907d
- https://gerrit.wikimedia.org/r/q/I3f7dbd8b873d411e37c8c3aac2339bf5ec36907d
- https://gerrit.wikimedia.org/r/q/I4900b1be73323599d74e3164447f81eded094d75
- https://gerrit.wikimedia.org/r/q/I4900b1be73323599d74e3164447f81eded094d75
- https://phabricator.wikimedia.org/T223654
- https://phabricator.wikimedia.org/T223654
Modified: 2024-11-21
CVE-2021-31548
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. A MediaWiki user who is partially blocked or was unsuccessfully blocked could bypass AbuseFilter and have their edits completed.
Modified: 2024-11-21
CVE-2021-31549
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. The Special:AbuseFilter/examine form allowed for the disclosure of suppressed MediaWiki usernames to unprivileged users.
- https://gerrit.wikimedia.org/r/q/I6063c02fa261c4cc0e6dbbb2db4e111eb85912c2
- https://gerrit.wikimedia.org/r/q/I6063c02fa261c4cc0e6dbbb2db4e111eb85912c2
- https://gerrit.wikimedia.org/r/q/I71a6d521bd12931ce60eec4d2dc35af19146000f
- https://gerrit.wikimedia.org/r/q/I71a6d521bd12931ce60eec4d2dc35af19146000f
- https://phabricator.wikimedia.org/T274152
- https://phabricator.wikimedia.org/T274152
Modified: 2024-11-21
CVE-2021-31550
An issue was discovered in the CommentBox extension for MediaWiki through 1.35.2. Via crafted configuration variables, a malicious actor could introduce XSS payloads into various layers.
Modified: 2024-11-21
CVE-2021-31551
An issue was discovered in the PageForms extension for MediaWiki through 1.35.2. Crafted payloads for Token-related query parameters allowed for XSS on certain PageForms-managed MediaWiki pages.
- https://gerrit.wikimedia.org/r/q/I20b63bd38779d2ccbe2d86f9879df85ca3b685f6
- https://gerrit.wikimedia.org/r/q/I20b63bd38779d2ccbe2d86f9879df85ca3b685f6
- https://gerrit.wikimedia.org/r/q/I5e0abbc2f80e6bda255b3b32a4df39a7fe7d3793
- https://gerrit.wikimedia.org/r/q/I5e0abbc2f80e6bda255b3b32a4df39a7fe7d3793
- https://gerrit.wikimedia.org/r/q/Ibe68b070ee791cd0c8e7f50eb04ac4e066b1512c
- https://gerrit.wikimedia.org/r/q/Ibe68b070ee791cd0c8e7f50eb04ac4e066b1512c
- https://phabricator.wikimedia.org/T259433
- https://phabricator.wikimedia.org/T259433
Modified: 2024-11-21
CVE-2021-31552
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It incorrectly executed certain rules related to blocking accounts after account creation. Such rules would allow for user accounts to be created while blocking only the IP address used to create an account (and not the user account itself). Such rules could also be used by a nefarious, unprivileged user to catalog and enumerate any number of IP addresses related to these account creations.
Modified: 2024-11-21
CVE-2021-31553
An issue was discovered in the CheckUser extension for MediaWiki through 1.35.2. MediaWiki usernames with trailing whitespace could be stored in the cu_log database table such that denial of service occurred for certain CheckUser extension pages and functionality. For example, the attacker could turn off Special:CheckUserLog and thus interfere with usage tracking.
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666963
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666963
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666964
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/666964
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667023
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667023
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667024
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667024
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667025
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667025
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667027
- https://gerrit.wikimedia.org/r/c/mediawiki/extensions/CheckUser/+/667027
- https://phabricator.wikimedia.org/T275669
- https://phabricator.wikimedia.org/T275669
Modified: 2024-11-21
CVE-2021-31554
An issue was discovered in the AbuseFilter extension for MediaWiki through 1.35.2. It improperly handled account blocks for certain automatically created MediaWiki user accounts, thus allowing nefarious users to remain unblocked.
Modified: 2024-11-21
CVE-2021-31555
An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. It did not validate the oarc_version (aka oauth_registered_consumer.oarc_version) parameter's length.
Modified: 2024-11-21
CVE-2021-31556
An issue was discovered in the Oauth extension for MediaWiki through 1.35.2. MWOAuthConsumerSubmitControl.php does not ensure that the length of an RSA key will fit in a MySQL blob.
- https://gerrit.wikimedia.org/r/q/I13ff0350a9a0a3cd5ab3e1f82dd0d8d9c13cf9e9
- https://gerrit.wikimedia.org/r/q/I13ff0350a9a0a3cd5ab3e1f82dd0d8d9c13cf9e9
- FEDORA-2021-56d8173b5e
- FEDORA-2021-56d8173b5e
- FEDORA-2021-3dd1b66cbf
- FEDORA-2021-3dd1b66cbf
- FEDORA-2021-eee8b7514f
- FEDORA-2021-eee8b7514f
- https://phabricator.wikimedia.org/T277380
- https://phabricator.wikimedia.org/T277380
Modified: 2024-11-21
CVE-2021-35197
In MediaWiki before 1.31.15, 1.32.x through 1.35.x before 1.35.3, and 1.36.x before 1.36.1, bots have certain unintended API access. When a bot account has a "sitewide block" applied, it is able to still "purge" pages through the MediaWiki Action API (which a "sitewide block" should have prevented).
- [debian-lts-announce] 20211009 [SECURITY] [DLA 2779-1] mediawiki security update
- [debian-lts-announce] 20211009 [SECURITY] [DLA 2779-1] mediawiki security update
- FEDORA-2021-56d8173b5e
- FEDORA-2021-56d8173b5e
- FEDORA-2021-3dd1b66cbf
- FEDORA-2021-3dd1b66cbf
- FEDORA-2021-eee8b7514f
- FEDORA-2021-eee8b7514f
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/thread/YR3X4L2CPSEJVSY543AWEO65TD6APXHP/
- https://phabricator.wikimedia.org/T280226
- https://phabricator.wikimedia.org/T280226
- GLSA-202107-40
- GLSA-202107-40
- DSA-4979
- DSA-4979
Modified: 2024-11-21
CVE-2021-36125
An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalRenameRequest page is vulnerable to infinite loops and denial of service attacks when a user's current username is beyond an arbitrary maximum configuration value (MaxNameChars).
Modified: 2024-11-21
CVE-2021-36126
An issue was discovered in the AbuseFilter extension in MediaWiki through 1.36. If the MediaWiki:Abusefilter-blocker message is invalid within the content language, the filter user falls back to the English version, but that English version could also be invalid on a wiki. This would result in a fatal error, and potentially fail to block or restrict a potentially nefarious user.
Modified: 2024-11-21
CVE-2021-36127
An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. The Special:GlobalUserRights page provided search results which, for a suppressed MediaWiki user, were different than for any other user, thus easily disclosing suppressed accounts (which are supposed to be completely hidden).
Modified: 2024-11-21
CVE-2021-36128
An issue was discovered in the CentralAuth extension in MediaWiki through 1.36. Autoblocks for CentralAuth-issued suppression blocks are not properly implemented.
- https://gerrit.wikimedia.org/r/q/I15d14c88a1e30df92c470bc191c4ee573172d4d1
- https://gerrit.wikimedia.org/r/q/I15d14c88a1e30df92c470bc191c4ee573172d4d1
- https://gerrit.wikimedia.org/r/q/I3e65690695313380c798b62edfda726b6e374f89
- https://gerrit.wikimedia.org/r/q/I3e65690695313380c798b62edfda726b6e374f89
- https://phabricator.wikimedia.org/T281972
- https://phabricator.wikimedia.org/T281972
Modified: 2024-11-21
CVE-2021-36129
An issue was discovered in the Translate extension in MediaWiki through 1.36. The Aggregategroups Action API module does not validate the parameter for aggregategroup when action=remove is set, thus allowing users with the translate-manage right to silently delete various groups' metadata.
Modified: 2024-11-21
CVE-2021-36130
An XSS issue was discovered in the SocialProfile extension in MediaWiki through 1.36. Within several gift-related special pages, a privileged user with the awardmanage right could inject arbitrary HTML and JavaScript within various gift-related data fields. The attack could easily propagate across many pages for many users.
Modified: 2024-11-21
CVE-2021-36131
An XSS issue was discovered in the SportsTeams extension in MediaWiki through 1.36. Within several special pages, a privileged user could inject arbitrary HTML and JavaScript within various data fields. The attack could easily propagate across many pages for many users.
Modified: 2024-11-21
CVE-2021-36132
An issue was discovered in the FileImporter extension in MediaWiki through 1.36. For certain relaxed configurations of the $wgFileImporterRequiredRight variable, it might not validate all appropriate user rights, thus allowing a user with insufficient rights to perform operations (specifically file uploads) that they should not be allowed to perform.
Package mediawiki-extensions-Widgets updated to version 1.3.0-alt1git for branch p9 in task 274917.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-35625
An issue was discovered in the Widgets extension for MediaWiki through 1.35.1. Any user with the ability to edit pages within the Widgets namespace could call any static function within any class (defined within PHP or MediaWiki) via a crafted HTML comment, related to a Smarty template. For example, a person in the Widget Editors group could use \MediaWiki\Shell\Shell::command within a comment.
Modified: 2024-11-21
CVE-2020-9382
An issue was discovered in the Widgets extension through 1.4.0 for MediaWiki. Improper title sanitization allowed for the execution of any wiki page as a widget (as defined by this extension) via MediaWiki's {{#widget:}} parser function.
Closed vulnerabilities
BDU:2021-00559
Уязвимость реализации функции getnum() резидентной системы управления базами данных класса NoSQL Redis, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2023-02181
Уязвимость системы управления базами данных NoSQL Redis, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-8080
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
- openSUSE-SU-2016:1444
- openSUSE-SU-2016:1444
- RHSA-2016:0095
- RHSA-2016:0095
- RHSA-2016:0096
- RHSA-2016:0096
- RHSA-2016:0097
- RHSA-2016:0097
- DSA-3412
- DSA-3412
- [oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- [oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- [oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- [oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- 77507
- 77507
- https://github.com/antirez/redis/issues/2855
- https://github.com/antirez/redis/issues/2855
- https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES
- GLSA-201702-16
- GLSA-201702-16
Modified: 2024-11-21
CVE-2020-14147
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
- openSUSE-SU-2020:1035
- openSUSE-SU-2020:1035
- https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
- https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
- https://github.com/antirez/redis/pull/6875
- https://github.com/antirez/redis/pull/6875
- GLSA-202008-17
- GLSA-202008-17
- DSA-4731
- DSA-4731
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
Modified: 2024-11-21
CVE-2021-21309
Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with remote code execution. Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it is 512MB which is a safe value for all platforms. If the limit is significantly increased, receiving a large request from a client may trigger several integer overflow scenarios, which would result with buffer overflow and heap corruption. We believe this could in certain conditions be exploited for remote code execution. By default, authenticated Redis users have access to all configuration parameters and can therefore use the “CONFIG SET proto-max-bulk-len” to change the safe default, making the system vulnerable. **This problem only affects 32-bit Redis (on a 32-bit system, or as a 32-bit executable running on a 64-bit system).** The problem is fixed in version 6.2, and the fix is back ported to 6.0.11 and 5.0.11. Make sure you use one of these versions if you are running 32-bit Redis. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent clients from directly executing `CONFIG SET`: Using Redis 6.0 or newer, ACL configuration can be used to block the command. Using older versions, the `rename-command` configuration directive can be used to rename the command to a random string unknown to users, rendering it inaccessible. Please note that this workaround may have an additional impact on users or operational systems that expect `CONFIG SET` to behave in certain ways.
- https://github.com/redis/redis/commit/c992857618db99776917f10bf4f2345a5fdc78b0
- https://github.com/redis/redis/commit/c992857618db99776917f10bf4f2345a5fdc78b0
- https://github.com/redis/redis/pull/8522
- https://github.com/redis/redis/pull/8522
- https://github.com/redis/redis/security/advisories/GHSA-hgj8-vff2-7cjf
- https://github.com/redis/redis/security/advisories/GHSA-hgj8-vff2-7cjf
- GLSA-202103-02
- GLSA-202103-02
Modified: 2024-11-21
CVE-2021-3470
A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.
Closed bugs
Прошу собрать версию 6.2.4