vulnerability
FreeBSD: VID-0e38b8f8-75dd-11eb-83f2-8c164567ca3c (CVE-2021-21309): redis -- Integer overflow on 32-bit systems
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Feb 23, 2021 | Feb 24, 2021 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Feb 23, 2021
Added
Feb 24, 2021
Modified
Dec 10, 2025
Description
Redis Development team reports: Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it is 512MB which is a safe value for all platforms. If the limit is significantly increased, receiving a large request from a client may trigger several integer overflow scenarios, which would result with buffer overflow and heap corruption.
Solutions
freebsd-upgrade-package-redis-develfreebsd-upgrade-package-redisfreebsd-upgrade-package-redis5
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.