Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2810-1 redis security update
Debian DSA Debian DSA DSA-5001-1 redis security update
EUVD EUVD EUVD-2021-19483 Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
Ubuntu USN Ubuntu USN USN-5221-1 Redis vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sun, 08 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.2::el7
cpe:/a:redhat:acm:2.4::el8

Mon, 19 Aug 2024 22:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.2::el8
cpe:/a:redhat:acm:2.4::el8

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T23:25:31.094Z

Reserved: 2021-05-12T00:00:00

Link: CVE-2021-32672

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-04T18:15:08.780

Modified: 2024-11-21T06:07:30.103

Link: CVE-2021-32672

cve-icon Redhat

Severity : Low

Publid Date: 2021-10-04T00:00:00Z

Links: CVE-2021-32672 - Bugzilla

cve-icon OpenCVE Enrichment

No data.