First published: Tue May 04 2021(Updated: )
A flaw was found in redis. An integer overflow bug could be exploited to corrupt the heap and potentially result with remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redislabs Redis | >=6.0.0<6.0.13 | |
Redislabs Redis | >=6.2.0<6.2.3 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
The flaw can be mitigated by disallowing usage of the STRALGO LCS command via ACL configuration. Please see https://redis.io/topics/acl for more information on how to do this.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-29477 is a vulnerability in Redis version 6.0 or newer that could be exploited to corrupt the heap and potentially result in remote code execution.
CVE-2021-29477 has a severity rating of 8.8, which is considered high.
Redis versions 6.0 or newer, up to and including version 6.2.3, are affected by CVE-2021-29477.
To fix CVE-2021-29477, update Redis to version 6.2.3 if you are using version 6.0 or newer.
You can find more information about CVE-2021-29477 on the Redis.io website, the GitHub security advisories page, and the Red Hat Bugzilla page.