vulnerability
Arch Linux: Arbitrary code execution (CVE-2021-32625)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Jun 2, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Jun 2, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
An integer overflow bug in Redis versions 6.0 up to 6.2.3 can be exploited using the STRALGO LCS command to corrupt the heap and potentially result in remote code execution. This is a result of an incomplete fix of CVE-2021-29477.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-32625
- https://attackerkb.com/topics/CVE-2021-32625
- URL-https://github.com/redis/redis/releases/tag/6.0.14
- URL-https://github.com/redis/redis/releases/tag/6.2.4
- URL-https://github.com/redis/redis/security/advisories/GHSA-46cp-x4x9-6pfq
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BHWOF7CBVUGDK3AN6H3BN3VNTH2TDUZZ/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN7INTZFE34MIQJO7WDDTIY5LIBGN6GI/
- URL-https://security.archlinux.org/ASA-202106-12
- CWE-680
- CWE-190
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.