AVG-2438 log

Package redis
Status Fixed
Severity High
Type multiple issues
Affected 6.2.5-1
Fixed 6.2.6-1
Current 7.2.4-1 [extra]
Ticket None
Created Mon Oct 4 20:20:27 2021
Issue Severity Remote Type Description
CVE-2021-41099 High Yes Arbitrary code execution
An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code...
CVE-2021-32762 High Yes Arbitrary code execution
The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network...
CVE-2021-32687 High Yes Arbitrary code execution
An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap...
CVE-2021-32675 High Yes Denial of service
When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of...
CVE-2021-32672 Low Yes Information disclosure
When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This...
CVE-2021-32628 High Yes Arbitrary code execution
An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote...
CVE-2021-32627 High Yes Arbitrary code execution
An integer overflow bug in Redis 5.0 or newer can be exploited to corrupt the heap and potentially result with remote code execution.  The vulnerability...
CVE-2021-32626 High Yes Arbitrary code execution
Specially crafted Lua scripts executing in Redis can cause the heap- based Lua stack to be overflowed, due to incomplete checks for this condition. This can...