From 85ae056da4ea76710d2d8d50cabf492d447bf2db Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Adrian=20Schr=C3=B6ter?= Date: Thu, 28 Nov 2024 14:16:03 +0100 Subject: [PATCH] Adding patchinfo patchinfo.20241126114953201915.269002615871826 --- .../_patchinfo | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 patchinfo.20241126114953201915.269002615871826/_patchinfo diff --git a/patchinfo.20241126114953201915.269002615871826/_patchinfo b/patchinfo.20241126114953201915.269002615871826/_patchinfo new file mode 100644 index 0000000..b716f9e --- /dev/null +++ b/patchinfo.20241126114953201915.269002615871826/_patchinfo @@ -0,0 +1,21 @@ + + + VUL-0: CVE-2024-31449: redis,valkey,redict: Integer overflow bug in Lua bit_tohex + VUL-0: CVE-2024-31228: redis,valkey,redict: Prevent unbounded recursive pattern matching + VUL-0: CVE-2024-31227: redis,valkey,redict: ACL: Fix parsing issue leading to denail of service + + + + ateixeira + important + security + Security update for redis + This update for redis fixes the following issues: + +- CVE-2024-31227: parsing issue leading to denail of service (bsc#1231266) +- CVE-2024-31228: prevent unbounded recursive pattern matching (bsc#1231265) +- CVE-2024-31449: integer overflow bug in Lua bit_tohex (bsc#1231264) + + redis + +