CVE-2021-3470
Published: 31 March 2021
A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process crash. Effectively this flaw does not affect the vast majority of users, who use jemalloc or glibc malloc.
Priority
Status
Package | Release | Status |
---|---|---|
redis Launchpad, Ubuntu, Debian |
bionic |
Needs triage
|
focal |
Needs triage
|
|
groovy |
Ignored
(end of life)
|
|
hirsute |
Not vulnerable
(5:6.0.11-1)
|
|
impish |
Not vulnerable
(5:6.0.11-1)
|
|
jammy |
Not vulnerable
(5:6.0.11-1)
|
|
kinetic |
Not vulnerable
(5:6.0.11-1)
|
|
lunar |
Not vulnerable
(5:6.0.11-1)
|
|
mantic |
Not vulnerable
(5:6.0.11-1)
|
|
trusty |
Needs triage
|
|
upstream |
Released
(5:6.0.9-1)
|
|
xenial |
Needs triage
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |