CVE-2020-14147

Name
CVE-2020-14147
Description
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Patch https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
Third Party Advisory https://github.com/antirez/redis/pull/6875
DEBIAN https://www.debian.org/security/2020/dsa-4731
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html
GENTOO https://security.gentoo.org/glsa/202008-17
MISC https://www.oracle.com/security-alerts/cpujan2021.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:* redis >= None < 6.0.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
redis 3.10-main 5.0.11-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.12-main 5.0.13-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.11-main 5.0.13-r0 TBK <alpine@jjtc.eu> possibly vulnerable