Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixed in versions 6.2.6, 6.0.16 and 5.0.14.
{
"versions": [
{
"introduced": "3.2.0"
},
{
"fixed": "5.0.14"
},
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.16"
},
{
"introduced": "6.2.0"
},
{
"fixed": "6.2.6"
},
{
"introduced": "0"
},
{
"last_affected": "8.0"
},
{
"introduced": "0"
},
{
"last_affected": "5.0"
}
]
}[
{
"digest": {
"length": 976.0,
"function_hash": "317564125385647258631515446476228874390"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2021-32672-01c69a01",
"target": {
"function": "ldbReplParseCommand",
"file": "src/scripting.c"
},
"source": "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"120823697845019607967104986639700798388",
"337405370187524436283833662412188245874",
"52976036462305738424998361523712302715",
"115907040841008265734411993486152633984",
"256846541954209937173634192563606273301",
"297633993523308980491455845083339034562",
"191242670694469571052606084491816143893",
"85858321810069706237631181945602266083",
"22844239357405574869750516618680663975",
"62647965359387630850995374088275454075",
"130586143788112339966721377047393629423",
"62874166062077122208860006585632891800",
"63301309297223767187549666536846522567",
"295908773895324095532999580993573466312",
"109254972476570952022113907303005028396",
"210840498263843464085399252211921254403",
"184002517942049753791096239650357057129",
"87423852731040584958789893474557578187",
"174632260599682992664098521937441152434",
"145318702385646759471267174713706020286",
"143309227430553277608858302547395403419",
"27581698092889084160877172864466405694",
"301169613490832553977890726859332140605",
"117335125399649687496828982355804482076",
"105177812853954267859358698104382414315",
"271536164718951338784576564582849116746",
"303216379372443720130594988358165675928",
"295979210924331036103030261793518313731",
"72717110345814622862430976133406604053",
"176078479171233001523192828403324918169",
"112380243225641015549815642922215107898",
"296981066181595428244653779350797435253",
"338699234530122151201822880434941882731"
]
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2021-32672-a6a86b05",
"target": {
"file": "src/scripting.c"
},
"source": "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd"
},
{
"digest": {
"length": 4875.0,
"function_hash": "316168307147346159691763691724516844826"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"id": "CVE-2021-32672-deba9155",
"target": {
"function": "ldbRepl",
"file": "src/scripting.c"
},
"source": "https://github.com/redis/redis/commit/6ac3c0b7abd35f37201ed2d6298ecef4ea1ae1dd"
}
]
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "33"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "34"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.4"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-32672.json"