QID 750019

QID 750019: SUSE Enterprise Linux Security Update for redis (SUSE-SU-2021:1652-1)

This update for redis fixes the following issues: redis was updated to 6.0.13: * cve-2021-29477: integer overflow in stralgo lcs command (bsc#1185729) * cve-2021-29478: integer overflow in copy command for large intsets (bsc#1185730) * cluster: skip unnecessary check which may prevent failure detection * fix performance regression in brpop on redis 6.0 * fix edge-case when a module client is unblocked redis 6.0.12: * fix compilation error on non-glibc systems if jemalloc is not used redis 6.0.11: * cve-2021-21309: avoid 32-bit overflows when proto-max-bulk-len is set high (bsc#1182657) * fix handling of threaded io and client pause (failover), could lead to data loss or a crash * fix the selection of a random element from large hash tables * fix broken protocol in client tracking tracking-redir-broken message * xinfo able to access expired keys on a replica * fix broken protocol in redis-benchmark when used with -a or --dbnum * avoid assertions (on older kernels) when testing arm64 cow bug * config rewrite should honor umask settings * fix firstkey,lastkey,step in command command for some commands * rm_zsetrem: delete key if empty, the bug could leave empty zset keys - switch systemd type of the sentinel service from notify to simple.
This can be reverted when updating to 6.2 which fixes .

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation allows attacker to compromise the system.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 6.5 severity.
  • Solution
    Upgrade to the latest package which contains the patch. To install this SUSE Security, Update use YaST online_update. Alternatively you can run the command listed for your product. To install packages using the command line interface, use command "yum update". Refer to Suse security advisory: SUSE-SU-2021:1652-1 to address this issue and obtain further details.

    CVEs related to QID 750019

    Software Advisories
    Advisory ID Software Component Link
    SUSE-SU-2021:1652-1 SUSE Enterprise Linux URL Logo lists.suse.com/pipermail/sle-security-updates/2021-May/008787.html