CVE-2021-32625 – Redis vulnerability in STRALGO LCS on 32-bit systems
https://notcve.org/view.php?id=CVE-2021-32625
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. • https://github.com/redis/redis/releases/tag/6.0.14 https://github.com/redis/redis/releases/tag/6.2.4 https://github.com/redis/redis/security/advisories/GHSA-46cp-x4x9-6pfq https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI • CWE-190: Integer Overflow or Wraparound CWE-680: Integer Overflow to Buffer Overflow •
CVE-2021-28678 – python-pillow: Excessive looping in BLP image reader
https://notcve.org/view.php?id=CVE-2021-28678
An issue was discovered in Pillow before 8.2.0. For BLP data, BlpImagePlugin did not properly check that reads (after jumping to file offsets) returned data. This could lead to a DoS where the decoder could be run a large number of times on empty data. Se ha detectado un problema en Pillow versiones anteriores a 8.2.0,. En el caso de los datos BLP, la función BlpImagePlugin no comprobaba apropiadamente que las lecturas (después de saltar a los offsets de los archivos) devolvían datos. • https://github.com/python-pillow/Pillow/pull/5377 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28678-fix-blp-dos https://security.gentoo.org/glsa/202107-33 https://access.redhat.com/security/cve/CVE-2021-28678 https://bugzilla.redhat.com/show_bug.cgi?id=1958263 • CWE-20: Improper Input Validation CWE-345: Insufficient Verification of Data Authenticity •
CVE-2021-25288 – python-pillow: Out-of-bounds read in J2K image reader
https://notcve.org/view.php?id=CVE-2021-25288
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. Se ha detectado un problema en Pillow versiones anteriores a 8.2.0,. Se presenta una lectura fuera de límites en J2kDecode, en la función j2ku_gray_i There is an out-of-bounds read in J2kDecode in j2ku_gray_i. For J2k images with multiple bands, it’s legal to have different widths for each band, e.g. 1 byte for L, 4 bytes for A. • https://github.com/python-pillow/Pillow/pull/5377#issuecomment-833821470 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-25287-cve-2021-25288-fix-oob-read-in-jpeg2kdecode https://security.gentoo.org/glsa/202107-33 https://access.redhat.com/security/cve/CVE-2021-25288 https://bugzilla.redhat.com/show_bug.cgi?id=1958231 • CWE-125: Out-of-bounds Read •
CVE-2021-28675 – python-pillow: Excessive memory allocation in PSD image reader
https://notcve.org/view.php?id=CVE-2021-28675
An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load. Se ha detectado un problema en Pillow versiones anteriores a 8.2.0, PSDImagePlugin.PsdImageFile carecía de una comprobación de saneamiento sobre el número de capas de entrada en relación con el tamaño del bloque de datos. Esto podría conllevar a un DoS en Image.open anterior a Image.load A flaw was found in python-pillow. • https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MQHA5HAIBOYI3R6HDWCLAGFTIQP767FL https://pillow.readthedocs.io/en/stable/releasenotes/8.2.0.html#cve-2021-28675-fix-dos-in-psdimageplugin https://security.gentoo.org/glsa/202107-33 https://access.redhat.com/security/cve/CVE-2021-28675 https://bugzilla.redhat.com/show_bug.cgi?id=1958240 • CWE-20: Improper Input Validation CWE-252: Unchecked Return Value •
CVE-2021-28091 – lasso: XML signature wrapping vulnerability when parsing SAML responses
https://notcve.org/view.php?id=CVE-2021-28091
Lasso all versions prior to 2.7.0 has improper verification of a cryptographic signature. Lasso todas las versiones anteriores a versión 2.7.0, presentan una verificación inapropiada de una firma criptográfica An XML Signature Wrapping (XSW) vulnerability was found in Lasso. This flaw allows an attacker to modify a valid SAML response to include an unsigned SAML assertion, which may be used to impersonate another valid user recognized by the service using Lasso. The highest threat from this vulnerability is to data confidentiality and integrity as well as service availability. • http://listes.entrouvert.com/arc/lasso https://git.entrouvert.org/lasso.git/commit/?id=076a37d7f0eb74001127481da2d355683693cde9 https://git.entrouvert.org/lasso.git/tree/NEWS?id=v2.7.0 https://lists.debian.org/debian-lts-announce/2021/06/msg00013.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SI4YAQF4VEV2KHQ6OXXZL7CJK7IZQ3EG https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YSVWOHBBWLI2RB5C6TXINFEJRT4YSD3D https://www.debian.org • CWE-345: Insufficient Verification of Data Authenticity CWE-347: Improper Verification of Cryptographic Signature •