RedHat: RHSA-2021-3945:01 Important: redis:6 security update
Summary
Redis is an advanced key-value store. It is often referred to as a
data-structure server since keys can contain strings, hashes, lists, sets,
and sorted sets. For performance, Redis works with an in-memory data set.
You can persist it either by dumping the data set to disk every once in a
while, or by appending each command to a log.
Security Fix(es):
* redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
* redis: Integer overflow issue with Streams (CVE-2021-32627)
* redis: Integer overflow bug in the ziplist data structure
(CVE-2021-32628)
* redis: Denial of service via Redis Standard Protocol (RESP) request
(CVE-2021-32675)
* redis: Integer overflow issue with intsets (CVE-2021-32687)
* redis: Integer overflow issue with strings (CVE-2021-41099)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2021-32626 https://access.redhat.com/security/cve/CVE-2021-32627 https://access.redhat.com/security/cve/CVE-2021-32628 https://access.redhat.com/security/cve/CVE-2021-32675 https://access.redhat.com/security/cve/CVE-2021-32687 https://access.redhat.com/security/cve/CVE-2021-41099 https://access.redhat.com/security/updates/classification/#important
Package List
Red Hat Enterprise Linux AppStream (v. 8):
Source:
redis-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.src.rpm
aarch64:
redis-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.aarch64.rpm
redis-debuginfo-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.aarch64.rpm
redis-debugsource-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.aarch64.rpm
redis-devel-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.aarch64.rpm
noarch:
redis-doc-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.noarch.rpm
ppc64le:
redis-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.ppc64le.rpm
redis-debuginfo-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.ppc64le.rpm
redis-debugsource-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.ppc64le.rpm
redis-devel-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.ppc64le.rpm
s390x:
redis-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.s390x.rpm
redis-debuginfo-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.s390x.rpm
redis-debugsource-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.s390x.rpm
redis-devel-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.s390x.rpm
x86_64:
redis-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.x86_64.rpm
redis-debuginfo-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.x86_64.rpm
redis-debugsource-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.x86_64.rpm
redis-devel-6.0.9-5.module+el8.4.0+12929+1bb0d2aa.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for the redis:6 module is now available for Red Hat EnterpriseLinux 8.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Bugs Fixed
2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets
2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request
2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure
2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams
2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack
2011020 - CVE-2021-41099 redis: Integer overflow issue with strings