QID 356511

QID 356511: Amazon Linux Security Advisory for redis : ALAS2REDIS6-2023-005

Redis is an in-memory database that persists on disk.
A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5.
On 32-bit systems, redis `*bit*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote code execution.
The vulnerability involves changing the default `proto-max-bulk-len` configuration parameter to a very large value and constructing specially crafted commands bit commands.
This problem only affects redis on 32-bit platforms, or compiled as a 32-bit binary.
Redis versions 5.0.`3m 6.0.15, and 6.2.5 contain patches for this issue.
An additional workaround to mitigate the problem without patching the `redis-server` executable is to prevent users from modifying the `proto-max-bulk-len` configuration parameter.
This can be done using acl to restrict unprivileged users from using the config set command. (
( CVE-2021-32761)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 6 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2REDIS6-2023-005 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356511

    Software Advisories
    Advisory ID Software Component Link
    ALAS2REDIS6-2023-005 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASREDIS6-2023-005.html