Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-10-04 18:15
Updated : 2023-11-07 03:35
NVD link : CVE-2021-32672
Mitre link : CVE-2021-32672
JSON object : View
Products Affected
debian
- debian_linux
redhat
- enterprise_linux
- software_collections
netapp
- management_services_for_netapp_hci
- management_services_for_element_software
fedoraproject
- fedora
oracle
- communications_operations_monitor
redis
- redis
CWE
CWE-125
Out-of-bounds Read