[ALSA-2021:3918] Important: redis:5 security update
Type:
security
Severity:
important
Release date:
2021-10-19
Description:
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626) * redis: Integer overflow issue with Streams (CVE-2021-32627) * redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628) * redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675) * redis: Integer overflow issue with intsets (CVE-2021-32687) * redis: Integer overflow issue with strings (CVE-2021-41099) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 redis-devel-5.0.3-5.module_el8.4.0+2583+b9845322.aarch64.rpm 0f9c5167ed15733f7df4e7cabf6846b2abe8b332dec572a6ab67a38c5fbd4aa6
aarch64 redis-5.0.3-5.module_el8.4.0+2583+b9845322.aarch64.rpm 4ddd00e299ea81973693d21fdb6f2284515f3b1d85970d9631621bdbea47582e
noarch redis-doc-5.0.3-5.module_el8.4.0+2583+b9845322.noarch.rpm 78b68b3410bb89a004d1dde64b9718f51cdd7c23248ada00b031f987bfc08ced
ppc64le redis-devel-5.0.3-5.module_el8.5.0+66+fc19ec12.ppc64le.rpm 077e016f921aa1ab37acfcf34dc3045a2a09a2a2dffa3fe46f9005f778d87dc0
ppc64le redis-5.0.3-5.module_el8.5.0+66+fc19ec12.ppc64le.rpm 45d29cd7f8d059e7465e825228a80291230a898e3034fec3d0054bc4f80ee049
x86_64 redis-devel-5.0.3-5.module_el8.4.0+2583+b9845322.x86_64.rpm 0c9cdd8f1f2f3eb3d4173c5eddf51663706b346ab7b37cc9c59073b467030eda
x86_64 redis-5.0.3-5.module_el8.4.0+2583+b9845322.x86_64.rpm 34ddb0964ac9be4bb40026656e6d0bc7ada7ac6bf9efebd79f91c3796581e224
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.