First published: Mon Oct 04 2021(Updated: )
Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/redis | 5:5.0.14-1+deb10u2 5:5.0.14-1+deb10u5 5:6.0.16-1+deb11u2 5:7.0.11-1 5:7.0.14-1 | |
redhat/redis | <6.2.6 | 6.2.6 |
redhat/redis | <6.0.16 | 6.0.16 |
redhat/redis | <5.0.14 | 5.0.14 |
Redis | >=3.2.0<5.0.14 | |
Redis | >=6.0.0<6.0.16 | |
Redis | >=6.2.0<6.2.6 | |
redhat software collections | ||
Red Hat Enterprise Linux | =8.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
Fedora | =33 | |
Fedora | =34 | |
Fedora | =35 | |
netapp management services for element software | ||
NetApp Management Services for NetApp HCI | ||
Oracle Communications Operations Monitor | =4.3 | |
Oracle Communications Operations Monitor | =4.4 | |
Oracle Communications Operations Monitor | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32672 is a vulnerability in Redis that allows users to send malformed requests to the Redis Lua Debugger.
CVE-2021-32672 has a severity rating of 4.3, which is considered medium.
This vulnerability affects all versions of Redis with Lua debugging support (3.2 or newer).
To fix CVE-2021-32672, you should update Redis to version 6.2.6 or apply the appropriate remediation provided by your operating system or package manager.
You can find more information about CVE-2021-32672 on the GitHub security advisory page (https://github.com/redis/redis/security/advisories/GHSA-9mj9-xx53-qmxm) or the Redis GitHub repository (https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd).