Vulnerability   
Search   
    Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2021.1652.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2021:1652-1)
Summary:The remote host is missing an update for the 'redis' package(s) announced via the SUSE-SU-2021:1652-1 advisory.
Description:Summary:
The remote host is missing an update for the 'redis' package(s) announced via the SUSE-SU-2021:1652-1 advisory.

Vulnerability Insight:
This update for redis fixes the following issues:

redis was updated to 6.0.13:

CVE-2021-29477: Integer overflow in STRALGO LCS command (bsc#1185729)

CVE-2021-29478: Integer overflow in COPY command for large intsets
(bsc#1185730)

Cluster: Skip unnecessary check which may prevent failure detection

Fix performance regression in BRPOP on Redis 6.0

Fix edge-case when a module client is unblocked

redis 6.0.12:

Fix compilation error on non-glibc systems if jemalloc is not used

redis 6.0.11:

CVE-2021-21309: Avoid 32-bit overflows when proto-max-bulk-len is set
high (bsc#1182657)

Fix handling of threaded IO and CLIENT PAUSE (failover), could lead to
data loss or a crash

Fix the selection of a random element from large hash tables

Fix broken protocol in client tracking tracking-redir-broken message

XINFO able to access expired keys on a replica

Fix broken protocol in redis-benchmark when used with -a or
--dbnum

Avoid assertions (on older kernels) when testing arm64 CoW bug

CONFIG REWRITE should honor umask settings

Fix firstkey,lastkey,step in COMMAND command for some commands

RM_ZsetRem: Delete key if empty, the bug could leave empty zset keys

Switch systemd type of the sentinel service from notify to simple. This
can be reverted when updating to 6.2 which fixes
[link moved to references] .

Affected Software/OS:
'redis' package(s) on SUSE Linux Enterprise Module for Server Applications 15-SP3, SUSE Linux Enterprise Module for Server Applications 15-SP2

Solution:
Please install the updated package(s).

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-21309
Common Vulnerability Exposure (CVE) ID: CVE-2021-29477
Common Vulnerability Exposure (CVE) ID: CVE-2021-29478
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.