QID 750019
QID 750019: SUSE Enterprise Linux Security Update for redis (SUSE-SU-2021:1652-1)
This update for redis fixes the following issues: redis was updated to 6.0.13: * cve-2021-29477: integer overflow in stralgo lcs command (bsc#1185729) * cve-2021-29478: integer overflow in copy command for large intsets (bsc#1185730) * cluster: skip unnecessary check which may prevent failure detection * fix performance regression in brpop on redis 6.0 * fix edge-case when a module client is unblocked redis 6.0.12: * fix compilation error on non-glibc systems if jemalloc is not used redis 6.0.11: * cve-2021-21309: avoid 32-bit overflows when proto-max-bulk-len is set high (bsc#1182657) * fix handling of threaded io and client pause (failover), could lead to data loss or a crash * fix the selection of a random element from large hash tables * fix broken protocol in client tracking tracking-redir-broken message * xinfo able to access expired keys on a replica * fix broken protocol in redis-benchmark when used with -a or --dbnum * avoid assertions (on older kernels) when testing arm64 cow bug * config rewrite should honor umask settings * fix firstkey,lastkey,step in command command for some commands * rm_zsetrem: delete key if empty, the bug could leave empty zset keys - switch systemd type of the sentinel service from notify to simple.
This can be reverted when updating to 6.2 which fixes .
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation allows attacker to compromise the system.
- SUSE-SU-2021:1652-1 -
lists.suse.com/pipermail/sle-security-updates/2021-May/008787.html
CVEs related to QID 750019
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| SUSE-SU-2021:1652-1 | SUSE Enterprise Linux |
|