aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorChris Lamb <lamby@debian.org>2023-03-13 16:50:35 +0000
committerChris Lamb <lamby@debian.org>2023-03-13 16:50:36 +0000
commit24aa2fe804a4167fdb9b0830397d9e440ad03388 (patch)
tree965815b78ad5010b1e45e80840437c877d814fdf
parent0f107ba67c0892f34793e8cda40ce1a53a277b6e (diff)
Add DLA-3361-1 for redis.
-rw-r--r--english/lts/security/2023/dla-3361.data9
-rw-r--r--english/lts/security/2023/dla-3361.wml32
2 files changed, 41 insertions, 0 deletions
diff --git a/english/lts/security/2023/dla-3361.data b/english/lts/security/2023/dla-3361.data
new file mode 100644
index 00000000000..a188b903fa4
--- /dev/null
+++ b/english/lts/security/2023/dla-3361.data
@@ -0,0 +1,9 @@
+<define-tag pagetitle>DLA-3361-1 redis</define-tag>
+<define-tag report_date>2023-03-13</define-tag>
+<define-tag secrefs>CVE-2022-36021</define-tag>
+<define-tag packages>redis</define-tag>
+<define-tag isvulnerable>yes</define-tag>
+<define-tag fixed>yes</define-tag>
+<define-tag fixed-section>no</define-tag>
+
+#use wml::debian::security
diff --git a/english/lts/security/2023/dla-3361.wml b/english/lts/security/2023/dla-3361.wml
new file mode 100644
index 00000000000..cecb0b1c5c4
--- /dev/null
+++ b/english/lts/security/2023/dla-3361.wml
@@ -0,0 +1,32 @@
+<define-tag description>LTS security update</define-tag>
+<define-tag moreinfo>
+
+<p>It was discovered that there was a potential remote denial of service
+vulnerability in Redis, a popular key-value database.</p>
+
+<p>Authenticated users could have used string matching commands (like
+<code>SCAN</code> or <code>KEYS</code>) with a specially crafted pattern to
+trigger a denial-of-service attack, causing it to hang and consume 100% CPU
+time.</p>
+
+<ul>
+
+<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36021">CVE-2022-36021</a>
+
+ <p>Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.</p></li>
+
+</ul>
+
+<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version
+5:5.0.14-1+deb10u3.</p>
+
+<p>We recommend that you upgrade your redis packages.</p>
+
+<p>Further information about Debian LTS security advisories, how to apply
+these updates to your system and frequently asked questions can be
+found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
+</define-tag>
+
+# do not modify the following line
+#include "$(ENGLISHDIR)/lts/security/2023/dla-3361.data"
+# $Id: $

© 2014-2024 Faster IT GmbH | imprint | privacy policy