CVE-2021-32625

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixed in version 6.2.4 and 6.0.14. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the STRALGO LCS command. On 64 bit systems which have the fixes of CVE-2021-29477 (6.2.3 or 6.0.13), it is sufficient to make sure that the proto-max-bulk-len config parameter is smaller than 2GB (default is 512MB).
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:x84:*
cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:x84:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://github.com/redis/redis/releases/tag/6.0.14 - Release Notes, Third Party Advisory () https://github.com/redis/redis/releases/tag/6.0.14 - Release Notes, Third Party Advisory
References () https://github.com/redis/redis/releases/tag/6.2.4 - Release Notes, Third Party Advisory () https://github.com/redis/redis/releases/tag/6.2.4 - Release Notes, Third Party Advisory
References () https://github.com/redis/redis/security/advisories/GHSA-46cp-x4x9-6pfq - Third Party Advisory () https://github.com/redis/redis/security/advisories/GHSA-46cp-x4x9-6pfq - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI/ -
CVSS v2 : 6.5
v3 : 8.8
v2 : 6.5
v3 : 7.5

07 Nov 2023, 03:35

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ/', 'name': 'FEDORA-2021-916f861096', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI/', 'name': 'FEDORA-2021-0ad4bec5b1', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ/ -

Information

Published : 2021-06-02 20:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32625

Mitre link : CVE-2021-32625

CVE.ORG link : CVE-2021-32625


JSON object : View

Products Affected

fedoraproject

  • fedora

redislabs

  • redis
CWE
CWE-680

Integer Overflow to Buffer Overflow

CWE-190

Integer Overflow or Wraparound