Vulnerability Database
Blog
FAQ
Docs
SUSE-SU-2021:2294-1
See a problem?
Please try reporting it
to the source
first.
Source
https://www.suse.com/support/update/announcement/2021/suse-su-20212294-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:2294-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/SUSE-SU-2021:2294-1
Related
CVE-2021-32625
Published
2021-07-12T06:26:59Z
Modified
2021-07-12T06:26:59Z
Summary
Security update for redis
Details
This update for redis fixes the following issues:
Upgrade to 6.0.14
CVE-2021-32625: An integer overflow bug could be exploited by using the STRALGO LCS command to cause remote remote code execution (bsc#1186722)
Fix crash in UNLINK on a stream key with deleted consumer groups
SINTERSTORE: Add missing keyspace del event when none of the sources exist
References
https://www.suse.com/support/update/announcement/2021/suse-su-20212294-1/
https://bugzilla.suse.com/1186722
https://www.suse.com/security/cve/CVE-2021-32625
Affected packages
SUSE:Linux Enterprise Module for Server Applications 15 SP2
/
redis
Package
Name
redis
Purl
pkg:rpm/suse/redis&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP2
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
6.0.14-6.5.1
Ecosystem specific
{ "binaries": [ { "redis": "6.0.14-6.5.1" } ] }
SUSE:Linux Enterprise Module for Server Applications 15 SP3
/
redis
Package
Name
redis
Purl
pkg:rpm/suse/redis&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
6.0.14-6.5.1
Ecosystem specific
{ "binaries": [ { "redis": "6.0.14-6.5.1" } ] }
SUSE-SU-2021:2294-1 - OSV