Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2021-10-04 18:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32672
Mitre link : CVE-2021-32672
CVE.ORG link : CVE-2021-32672
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
redis
- redis
netapp
- management_services_for_element_software
- management_services_for_netapp_hci
oracle
- communications_operations_monitor
redhat
- enterprise_linux
- software_collections
CWE
CWE-125
Out-of-bounds Read