CVE-2021-32626

Priority
Description
Redis is an open source, in-memory database that persists on disk. In
affected versions specially crafted Lua scripts executing in Redis can
cause the heap-based Lua stack to be overflowed, due to incomplete checks
for this condition. This can result with heap corruption and potentially
remote code execution. This problem exists in all versions of Redis with
Lua scripting support, starting from 2.6. The problem is fixed in versions
6.2.6, 6.0.16 and 5.0.14. For users unable to update an additional
workaround to mitigate the problem without patching the redis-server
executable is to prevent users from executing Lua scripts. This can be done
using ACL to restrict EVAL and EVALSHA commands.
Notes
Package
Source: redis (LP Ubuntu Debian)
Upstream:released (5:6.0.16-1)
Ubuntu 18.04 LTS:needed
Ubuntu 20.04 LTS:needed
Ubuntu 21.10:needed
Ubuntu 22.04 LTS:not-affected (5:6.0.16-1)
Ubuntu 14.04 ESM:needed
Patches:
More Information

Updated: 2022-04-25 00:55:37 UTC (commit ecc1009cb19540b950de59270950018900f37f15)