The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Hiredis: NULL pointer dereference via async.c / dict.c

Synthesis of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via async.c / dict.c of Hiredis, in order to trigger a denial of service.
Impacted products: Debian, Fedora.
Severity of this bulletin: 1/4.
Creation date: 29/01/2020.
Références of this threat: CVE-2020-7105, DLA-2083-1, FEDORA-2020-53a54ef986, FEDORA-2020-f6cc7883b8, VIGILANCE-VUL-31461.

Description of the vulnerability 

An attacker can force a NULL pointer to be dereferenced via async.c / dict.c of Hiredis, in order to trigger a denial of service.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability bulletin impacts software or systems such as Debian, Fedora.

Our Vigil@nce team determined that the severity of this vulnerability bulletin is low.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this threat note.

Solutions for this threat 

Debian 8: new hiredis packages.
New packages are available:
  Debian 8: hiredis 0.11.0-4+deb8u1

Fedora: new hiredis packages.
New packages are available:
  Fedora 30: hiredis 0.13.3-13.fc30
  Fedora 31: hiredis 0.13.3-13.fc31
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an applications vulnerabilities patch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.