Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2021:3946 - Security Advisory
Issued:
2021-10-20
Updated:
2021-10-20

RHSA-2021:3946 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: redis:5 security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for the redis:5 module is now available for Red Hat Enterprise Linux 8.1 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.

Security Fix(es):

  • redis: Lua scripts can overflow the heap-based Lua stack (CVE-2021-32626)
  • redis: Integer overflow issue with Streams (CVE-2021-32627)
  • redis: Integer overflow bug in the ziplist data structure (CVE-2021-32628)
  • redis: Denial of service via Redis Standard Protocol (RESP) request (CVE-2021-32675)
  • redis: Integer overflow issue with intsets (CVE-2021-32687)
  • redis: Integer overflow issue with strings (CVE-2021-41099)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2010991 - CVE-2021-32687 redis: Integer overflow issue with intsets
  • BZ - 2011000 - CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request
  • BZ - 2011004 - CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure
  • BZ - 2011010 - CVE-2021-32627 redis: Integer overflow issue with Streams
  • BZ - 2011017 - CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack
  • BZ - 2011020 - CVE-2021-41099 redis: Integer overflow issue with strings

CVEs

  • CVE-2021-32626
  • CVE-2021-32627
  • CVE-2021-32628
  • CVE-2021-32675
  • CVE-2021-32687
  • CVE-2021-41099

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.1

SRPM
redis-5.0.3-5.module+el8.1.0+12925+6460abef.src.rpm SHA-256: 16117107ae2d0feccd1a5936b4779f209158c01bb442836c9e56775f498a1575
x86_64
redis-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: 3ef9ee1d78fed0ffbd5ad31f6c758039f80dfcc0735ab1ae98c66752dcd80249
redis-debuginfo-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: da1e7f7c6ae3324d68f9dd36e5828072134bc207ede0f6dbea0202e3b627f62b
redis-debugsource-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: b0e67d446d6be255d299951628208e0f57c546c2fa871868fe12b8a296bfcf8b
redis-devel-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: 8c651c6d085b0296a3900cc6b98720b4c3ae2f868e04cf54f92ab49d80ab4424
redis-doc-5.0.3-5.module+el8.1.0+12925+6460abef.noarch.rpm SHA-256: 0cb8d254f984a2c1d9523feb2ce07ded18bdb6932ca0b5b0fbb23aaef6450fd3

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.1

SRPM
redis-5.0.3-5.module+el8.1.0+12925+6460abef.src.rpm SHA-256: 16117107ae2d0feccd1a5936b4779f209158c01bb442836c9e56775f498a1575
s390x
redis-doc-5.0.3-5.module+el8.1.0+12925+6460abef.noarch.rpm SHA-256: 0cb8d254f984a2c1d9523feb2ce07ded18bdb6932ca0b5b0fbb23aaef6450fd3
redis-5.0.3-5.module+el8.1.0+12925+6460abef.s390x.rpm SHA-256: 2105d403f9570f80b761d5361614b6854fc18869338a30c4586454c5e1f03be4
redis-debuginfo-5.0.3-5.module+el8.1.0+12925+6460abef.s390x.rpm SHA-256: 8e379034924a8ac7fd3f044fcef970540c0fcae584ad361714d1f18791eb7460
redis-debugsource-5.0.3-5.module+el8.1.0+12925+6460abef.s390x.rpm SHA-256: cc6c48f734a6cb29f2dafe5ad5dd4dd98fedf7e1c1f408b7b28a09f111ec8f14
redis-devel-5.0.3-5.module+el8.1.0+12925+6460abef.s390x.rpm SHA-256: 315f5b59fc5f56c3661687d899ffa868e2cda25c116347fa3a7db79f35f9342d

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.1

SRPM
redis-5.0.3-5.module+el8.1.0+12925+6460abef.src.rpm SHA-256: 16117107ae2d0feccd1a5936b4779f209158c01bb442836c9e56775f498a1575
ppc64le
redis-doc-5.0.3-5.module+el8.1.0+12925+6460abef.noarch.rpm SHA-256: 0cb8d254f984a2c1d9523feb2ce07ded18bdb6932ca0b5b0fbb23aaef6450fd3
redis-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: 3443bcf683a7cf1950d3332eee22c02297d2d1dd79198663e0859a196ddba59c
redis-debuginfo-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: 23bd75dd8cf4134c175dfb45ebaf8031d1d829296f6cdcfa83aeba69cf4154a8
redis-debugsource-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: d5b19b2376d2e7fdbbd11fc45baa268a1fcb60c8d85945b62bf67bd91a94b776
redis-devel-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: ac9f01d30d1683d6e91aa764c0d0f8d5bf26bb02fb365127323b457a1ea55d78

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.1

SRPM
redis-5.0.3-5.module+el8.1.0+12925+6460abef.src.rpm SHA-256: 16117107ae2d0feccd1a5936b4779f209158c01bb442836c9e56775f498a1575
aarch64
redis-doc-5.0.3-5.module+el8.1.0+12925+6460abef.noarch.rpm SHA-256: 0cb8d254f984a2c1d9523feb2ce07ded18bdb6932ca0b5b0fbb23aaef6450fd3
redis-5.0.3-5.module+el8.1.0+12925+6460abef.aarch64.rpm SHA-256: eaf5a0b46a86f9b5f62e66d3238a76bb19f0e2ddaef7b5d879cacd1b9af7741f
redis-debuginfo-5.0.3-5.module+el8.1.0+12925+6460abef.aarch64.rpm SHA-256: db5b8f6d697498afd97459146434f40a94ecef50625b6b935d6150608de41ad8
redis-debugsource-5.0.3-5.module+el8.1.0+12925+6460abef.aarch64.rpm SHA-256: 235faa0d6ffeaadd1c15148436bc78928ebc1abf22ad8d590f9575957e77592a
redis-devel-5.0.3-5.module+el8.1.0+12925+6460abef.aarch64.rpm SHA-256: 044ef9185f5516937c7766ad12e0e7ef196aa292e86b5562aaa47d3e5180b0aa

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
redis-5.0.3-5.module+el8.1.0+12925+6460abef.src.rpm SHA-256: 16117107ae2d0feccd1a5936b4779f209158c01bb442836c9e56775f498a1575
ppc64le
redis-doc-5.0.3-5.module+el8.1.0+12925+6460abef.noarch.rpm SHA-256: 0cb8d254f984a2c1d9523feb2ce07ded18bdb6932ca0b5b0fbb23aaef6450fd3
redis-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: 3443bcf683a7cf1950d3332eee22c02297d2d1dd79198663e0859a196ddba59c
redis-debuginfo-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: 23bd75dd8cf4134c175dfb45ebaf8031d1d829296f6cdcfa83aeba69cf4154a8
redis-debugsource-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: d5b19b2376d2e7fdbbd11fc45baa268a1fcb60c8d85945b62bf67bd91a94b776
redis-devel-5.0.3-5.module+el8.1.0+12925+6460abef.ppc64le.rpm SHA-256: ac9f01d30d1683d6e91aa764c0d0f8d5bf26bb02fb365127323b457a1ea55d78

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
redis-5.0.3-5.module+el8.1.0+12925+6460abef.src.rpm SHA-256: 16117107ae2d0feccd1a5936b4779f209158c01bb442836c9e56775f498a1575
x86_64
redis-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: 3ef9ee1d78fed0ffbd5ad31f6c758039f80dfcc0735ab1ae98c66752dcd80249
redis-debuginfo-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: da1e7f7c6ae3324d68f9dd36e5828072134bc207ede0f6dbea0202e3b627f62b
redis-debugsource-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: b0e67d446d6be255d299951628208e0f57c546c2fa871868fe12b8a296bfcf8b
redis-devel-5.0.3-5.module+el8.1.0+12925+6460abef.x86_64.rpm SHA-256: 8c651c6d085b0296a3900cc6b98720b4c3ae2f868e04cf54f92ab49d80ab4424
redis-doc-5.0.3-5.module+el8.1.0+12925+6460abef.noarch.rpm SHA-256: 0cb8d254f984a2c1d9523feb2ce07ded18bdb6932ca0b5b0fbb23aaef6450fd3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility