Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 636208 (CVE-2016-10517)

Summary: <dev-db/redis-3.2.7: Cross Protocol Scripting vulnerability (CVE-2016-10517)
Product: Gentoo Security Reporter: GLSAMaker/CVETool Bot <glsamaker>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: robbat2, ultrabug
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
Whiteboard: B4 [noglsa cve]
Package list:
Runtime testing required: ---

Description GLSAMaker/CVETool Bot gentoo-dev 2017-11-01 20:39:28 UTC
CVE-2016-10517 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10517):
  networking.c in Redis before 3.2.7 allows "Cross Protocol Scripting" because
  it lacks a check for POST and Host: strings, which are not valid in the
  Redis protocol (but commonly occur when an attack triggers an HTTP request
  to the Redis TCP port).
Comment 1 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-11-01 20:41:07 UTC
@Maintainers please clean all before 3.2.7 after stabilization in bug 631002

Thank you
Comment 2 Aaron Bauman (RETIRED) gentoo-dev 2018-04-22 21:41:23 UTC
GLSA Vote: No

cleanup will happen in bug 631002