First published: Tue May 04 2021(Updated: )
A flaw was found in redis. An integer overflow bug could be exploited to corrupt the heap and potentially result with remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redislabs Redis | >=6.2.0<6.2.3 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
The flaw can be mitigated by disallowing usage of the CONFIG SET command via ACL configuration. This will prevent clients from setting the set-max-intset-entries configuration parameter. Please see https://redis.io/topics/acl for more information on how to do this.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Redis flaw is CVE-2021-29478.
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker.
The severity of CVE-2021-29478 is high, with a CVSS score of 8.8.
CVE-2021-29478 can be exploited using an integer overflow bug in Redis version 6.2 before 6.2.3, which could potentially result in remote code execution.
To fix CVE-2021-29478, update Redis to version 6.2.3 or later.