Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Management Services For Element Software And Netapp Hci Subscribe
Hiredis Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2783-1 hiredis security update
EUVD EUVD EUVD-2021-19533 Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00479}

epss

{'score': 0.00634}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-03T23:33:55.893Z

Reserved: 2021-05-12T00:00:00

Link: CVE-2021-32765

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-04T21:15:12.527

Modified: 2024-11-21T06:07:41.780

Link: CVE-2021-32765

cve-icon Redhat

Severity : Important

Publid Date: 2021-10-04T00:00:00Z

Links: CVE-2021-32765 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses