diff options
author | Yasuhiro Kimura <yasu@FreeBSD.org> | 2025-07-08 02:16:17 +0900 |
---|---|---|
committer | Yasuhiro Kimura <yasu@FreeBSD.org> | 2025-07-08 04:22:05 +0900 |
commit | c3574ad8eb341427cebbe54e55c4bb47aa88844c (patch) | |
tree | 2cf7c428a59c78c2c498f800cec6d9493053056c /security | |
parent | multimedia/mkvtoolnix: Update to upstream version 93.0 (diff) |
security/vuxml: Document multiple vlunerabilities in redis and valky
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln/2025.xml | 133 |
1 files changed, 133 insertions, 0 deletions
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml index df02c508bef1..1dafd3a8abc8 100644 --- a/security/vuxml/vuln/2025.xml +++ b/security/vuxml/vuln/2025.xml @@ -1,3 +1,136 @@ + <vuln vid="7b3e7f71-5b30-11f0-b507-000c295725e4"> + <topic>redis,valkey -- DoS Vulnerability due to bad connection error handling</topic> + <affects> + <package> + <name>redis</name> + <range><ge>8.0.0</ge><lt>8.0.3</lt></range> + </package> + <package> + <name>redis74</name> + <range><ge>7.4.0</ge><lt>7.4.5</lt></range> + </package> + <package> + <name>redis72</name> + <range><ge>7.2.0</ge><lt>7.2.10</lt></range> + </package> + <package> + <name>redis62</name> + <range><ge>6.2.0</ge><lt>6.2.19</lt></range> + </package> + <package> + <name>valkey</name> + <range><lt>8.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>@julienperriercornet reports:</p> + <blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-4q32-c38c-pwgq"> + <p> + An unauthenticated connection can cause repeated IP + protocol errors, leading to client starvation and, + ultimately, a denial of service. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-48367</cvename> + <url>https://github.com/redis/redis/security/advisories/GHSA-4q32-c38c-pwgq</url> + </references> + <dates> + <discovery>2025-07-06</discovery> + <entry>2025-07-07</entry> + </dates> + </vuln> + + <vuln vid="f11d0a69-5b2d-11f0-b507-000c295725e4"> + <topic>redis,valkey -- Out of bounds write in hyperloglog commands leads to RCE</topic> + <affects> + <package> + <name>redis</name> + <range><ge>8.0.0</ge><lt>8.0.3</lt></range> + </package> + <package> + <name>redis74</name> + <range><ge>7.4.0</ge><lt>7.4.5</lt></range> + </package> + <package> + <name>redis72</name> + <range><ge>7.2.0</ge><lt>7.2.10</lt></range> + </package> + <package> + <name>redis62</name> + <range><ge>6.2.0</ge><lt>6.2.19</lt></range> + </package> + <package> + <name>valkey</name> + <range><lt>8.1.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Seunghyun Lee reports:</p> + <blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-rp2m-q4j6-gr43"> + <p> + An authenticated user may use a specially crafted string + to trigger a stack/heap out of bounds write on hyperloglog + operations, potentially leading to remote code execution. + </p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-32023</cvename> + <url>https://github.com/redis/redis/security/advisories/GHSA-rp2m-q4j6-gr43</url> + </references> + <dates> + <discovery>2025-07-06</discovery> + <entry>2025-07-07</entry> + </dates> + </vuln> + + <vuln vid="4ea9cbc3-5b28-11f0-b507-000c295725e4"> + <topic>redis,valkey -- {redis,valkey}-check-aof may lead to stack overflow and potential RCE</topic> + <affects> + <package> + <name>redis</name> + <range><ge>8.0.0</ge><lt>8.0.2</lt></range> + </package> + <package> + <name>redis74</name> + <range><ge>7.4.0</ge><lt>7.4.4</lt></range> + </package> + <package> + <name>redis72</name> + <range><ge>7.2.0</ge><lt>7.2.9</lt></range> + </package> + <package> + <name>valkey</name> + <range><lt>8.1.2</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Simcha Kosman & CyberArk Labs reports:</p> + <blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-5453-q98w-cmvm"> + <p>A user can run the {redis,valkeyu}-check-aof cli and pass + a long file path to trigger a stack buffer overflow, which + may potentially lead to remote code execution.</p> + <p></p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2025-27151</cvename> + <url>https://github.com/redis/redis/security/advisories/GHSA-5453-q98w-cmvm</url> + </references> + <dates> + <discovery>2025-05-28</discovery> + <entry>2025-07-07</entry> + </dates> + </vuln> + <vuln vid="7642ba72-5abf-11f0-87ba-002590c1f29c"> <topic>FreeBSD -- Use-after-free in multi-threaded xz decoder</topic> <affects> |