{
  "Definition": [
    {
      "ID": "oval:org.altlinux.errata:def:20221669",
      "Version": "oval:org.altlinux.errata:def:20221669",
      "Class": "patch",
      "Metadata": {
        "Title": "ALT-PU-2022-1669: package `hiredis` update to version 1.0.2-alt1",
        "AffectedList": [
          {
            "Family": "unix",
            "Platforms": [
              "ALT Linux branch c10f1"
            ],
            "Products": [
              "ALT SP Workstation",
              "ALT SP Server"
            ]
          }
        ],
        "References": [
          {
            "RefID": "ALT-PU-2022-1669",
            "RefURL": "https://errata.altlinux.org/ALT-PU-2022-1669",
            "Source": "ALTPU"
          },
          {
            "RefID": "CVE-2021-32765",
            "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-32765",
            "Source": "CVE"
          }
        ],
        "Description": "This update upgrades hiredis to version 1.0.2-alt1. \nSecurity Fix(es):\n\n * CVE-2021-32765: Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible.",
        "Advisory": {
          "From": "errata.altlinux.org",
          "Severity": "High",
          "Rights": "Copyright 2024 BaseALT Ltd.",
          "Issued": {
            "Date": "2022-04-11"
          },
          "Updated": {
            "Date": "2022-04-11"
          },
          "BDUs": null,
          "CVEs": [
            {
              "ID": "CVE-2021-32765",
              "CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
              "CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "CWE": "CWE-190",
              "Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-32765",
              "Impact": "High",
              "Public": "20211004"
            }
          ],
          "AffectedCPEs": {
            "CPEs": [
              "cpe:/o:alt:spworkstation:10",
              "cpe:/o:alt:spserver:10"
            ]
          }
        }
      },
      "Criteria": {
        "Operator": "AND",
        "Criterions": [
          {
            "TestRef": "oval:org.altlinux.errata:tst:4001",
            "Comment": "ALT Linux must be installed"
          }
        ],
        "Criterias": [
          {
            "Operator": "OR",
            "Criterions": [
              {
                "TestRef": "oval:org.altlinux.errata:tst:20221669001",
                "Comment": "libhiredis-devel is earlier than 0:1.0.2-alt1"
              },
              {
                "TestRef": "oval:org.altlinux.errata:tst:20221669002",
                "Comment": "libhiredis1.0.0 is earlier than 0:1.0.2-alt1"
              }
            ]
          }
        ]
      }
    }
  ]
}