CVE-2021-29477

NameCVE-2021-29477
DescriptionRedis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to corrupt the heap and potentially result with remote code execution. The problem is fixed in version 6.2.3 and 6.0.13. An additional workaround to mitigate the problem without patching the redis-server executable is to use ACL configuration to prevent clients from using the `STRALGO LCS` command.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium
Debian Bugs988045

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redis (PTS)stretch3:3.2.6-3+deb9u3fixed
stretch (security)3:3.2.6-3+deb9u5fixed
buster5:5.0.3-4+deb10u3fixed
buster (security)5:5.0.3-4+deb10u2fixed
bullseye5:6.0.14-1fixed
sid5:6.0.15-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redissourcestretch(not affected)
redissourcebuster(not affected)
redissource(unstable)5:6.0.13-1988045

Notes

[buster] - redis <not-affected> (Vulnerable code not present)
[stretch] - redis <not-affected> (Vulnerable code not present)
https://groups.google.com/g/redis-db/c/6GSWzTW0PR8/m/8FbdIEEoBAAJ
https://github.com/redis/redis/commit/f0c5f920d0f88bd8aa376a2c05af4902789d1ef9

Search for package or bug name: Reporting problems