diff options
author | Chris Lamb <lamby@debian.org> | 2023-03-13 16:50:35 +0000 |
---|---|---|
committer | Chris Lamb <lamby@debian.org> | 2023-03-13 16:50:36 +0000 |
commit | 24aa2fe804a4167fdb9b0830397d9e440ad03388 (patch) | |
tree | 965815b78ad5010b1e45e80840437c877d814fdf | |
parent | 0f107ba67c0892f34793e8cda40ce1a53a277b6e (diff) |
Add DLA-3361-1 for redis.
-rw-r--r-- | english/lts/security/2023/dla-3361.data | 9 | ||||
-rw-r--r-- | english/lts/security/2023/dla-3361.wml | 32 |
2 files changed, 41 insertions, 0 deletions
diff --git a/english/lts/security/2023/dla-3361.data b/english/lts/security/2023/dla-3361.data new file mode 100644 index 00000000000..a188b903fa4 --- /dev/null +++ b/english/lts/security/2023/dla-3361.data @@ -0,0 +1,9 @@ +<define-tag pagetitle>DLA-3361-1 redis</define-tag> +<define-tag report_date>2023-03-13</define-tag> +<define-tag secrefs>CVE-2022-36021</define-tag> +<define-tag packages>redis</define-tag> +<define-tag isvulnerable>yes</define-tag> +<define-tag fixed>yes</define-tag> +<define-tag fixed-section>no</define-tag> + +#use wml::debian::security diff --git a/english/lts/security/2023/dla-3361.wml b/english/lts/security/2023/dla-3361.wml new file mode 100644 index 00000000000..cecb0b1c5c4 --- /dev/null +++ b/english/lts/security/2023/dla-3361.wml @@ -0,0 +1,32 @@ +<define-tag description>LTS security update</define-tag> +<define-tag moreinfo> + +<p>It was discovered that there was a potential remote denial of service +vulnerability in Redis, a popular key-value database.</p> + +<p>Authenticated users could have used string matching commands (like +<code>SCAN</code> or <code>KEYS</code>) with a specially crafted pattern to +trigger a denial-of-service attack, causing it to hang and consume 100% CPU +time.</p> + +<ul> + +<li><a href="https://security-tracker.debian.org/tracker/CVE-2022-36021">CVE-2022-36021</a> + + <p>Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.</p></li> + +</ul> + +<p>For Debian 10 <q>Buster</q>, this problem has been fixed in version +5:5.0.14-1+deb10u3.</p> + +<p>We recommend that you upgrade your redis packages.</p> + +<p>Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p> +</define-tag> + +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2023/dla-3361.data" +# $Id: $ |