Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
References
Link | Resource |
---|---|
https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm | Third Party Advisory |
https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/ | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20211104-0003/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/ | Mailing List Third Party Advisory |
https://www.debian.org/security/2021/dsa-5001 | Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://security.gentoo.org/glsa/202209-17 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2021-10-04 11:15
Updated : 2022-10-06 09:50
NVD link : CVE-2021-32672
Mitre link : CVE-2021-32672
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
redhat
- enterprise_linux
- software_collections
redis
- redis
netapp
- management_services_for_netapp_hci
- management_services_for_element_software
fedoraproject
- fedora
oracle
- communications_operations_monitor
debian
- debian_linux