First published: Sat Jul 15 2023(Updated: )
Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server by sending a non-administrative command (specifically, a SET command). NOTE: this was fixed for Redis 6.2.x and 7.x in 2021. Versions before 6.2 were not intended to have safety guarantees related to this.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redis Redis | <6.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31294 is a vulnerability in Redis versions before 6.2.0 that allows a replica to cause an assertion failure in a primary server by sending a non-administrative command.
The severity of CVE-2021-31294 is medium with a CVSS score of 5.9.
To fix CVE-2021-31294, upgrade to Redis version 6.2.0 or later.
No, Redis version 6.2.0 and later are not affected by CVE-2021-31294.
You can find more information about CVE-2021-31294 on the Redis GitHub repository and the associated GitHub issues.