It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2021-32626)
It was discovered that Redis incorrectly handled some malformed requests when using Redis Lua Debugger. A remote attacker could possibly use this issue to cause a denial of service or other unspecified impact. This issue only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2021-32672)
It was discovered that Redis incorrectly handled certain Redis Standard Protocol (RESP) requests. A remote attacker could possibly use this issue to cause a denial of service. (CVE-2021-32675)
It was discovered that Redis incorrectly handled some configuration parameters with specially crafted network payloads. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. Vulnerabilities CVE-2021-32627 and CVE-2021-41099 only affected Ubuntu 18.04 ESM and Ubuntu 20.04 ESM. (CVE-2021-32627, CVE-2021-32628, CVE-2021-32687, CVE-2021-41099).
It was discovered that Redis incorrectly handled memory when processing certain input in 32-bit systems. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. One vulnerability (CVE-2021-32761) only affected Ubuntu 14.04 ESM, Ubuntu 16.04 ESM and Ubuntu 18.04 ESM and another vulnerability (CVE-2021-21309) only affected Ubuntu 18.04 ESM. (CVE-2021-32761, CVE-2021-21309).
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "binaries": [ { "binary_version": "2:2.8.4-2ubuntu0.2+esm2", "binary_name": "redis-server" }, { "binary_version": "2:2.8.4-2ubuntu0.2+esm2", "binary_name": "redis-server-dbgsym" }, { "binary_version": "2:2.8.4-2ubuntu0.2+esm2", "binary_name": "redis-tools" }, { "binary_version": "2:2.8.4-2ubuntu0.2+esm2", "binary_name": "redis-tools-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "2:3.0.6-1ubuntu0.4+esm1", "binary_name": "redis-sentinel" }, { "binary_version": "2:3.0.6-1ubuntu0.4+esm1", "binary_name": "redis-server" }, { "binary_version": "2:3.0.6-1ubuntu0.4+esm1", "binary_name": "redis-server-dbgsym" }, { "binary_version": "2:3.0.6-1ubuntu0.4+esm1", "binary_name": "redis-tools" }, { "binary_version": "2:3.0.6-1ubuntu0.4+esm1", "binary_name": "redis-tools-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "5:4.0.9-1ubuntu0.2+esm3", "binary_name": "redis" }, { "binary_version": "5:4.0.9-1ubuntu0.2+esm3", "binary_name": "redis-sentinel" }, { "binary_version": "5:4.0.9-1ubuntu0.2+esm3", "binary_name": "redis-server" }, { "binary_version": "5:4.0.9-1ubuntu0.2+esm3", "binary_name": "redis-tools" }, { "binary_version": "5:4.0.9-1ubuntu0.2+esm3", "binary_name": "redis-tools-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_version": "5:5.0.7-2ubuntu0.1+esm1", "binary_name": "redis" }, { "binary_version": "5:5.0.7-2ubuntu0.1+esm1", "binary_name": "redis-sentinel" }, { "binary_version": "5:5.0.7-2ubuntu0.1+esm1", "binary_name": "redis-server" }, { "binary_version": "5:5.0.7-2ubuntu0.1+esm1", "binary_name": "redis-tools" }, { "binary_version": "5:5.0.7-2ubuntu0.1+esm1", "binary_name": "redis-tools-dbgsym" } ] }