SUSE_ALP_Standard/patchinfo.20241126114953201915.269002615871826/_patchinfo

21 lines
1.1 KiB
Plaintext

<patchinfo incident="111">
<!-- generated from request(s) 347693 -->
<issue tracker="bnc" id="1231264">VUL-0: CVE-2024-31449: redis,valkey,redict: Integer overflow bug in Lua bit_tohex</issue>
<issue tracker="bnc" id="1231265">VUL-0: CVE-2024-31228: redis,valkey,redict: Prevent unbounded recursive pattern matching</issue>
<issue tracker="bnc" id="1231266">VUL-0: CVE-2024-31227: redis,valkey,redict: ACL: Fix parsing issue leading to denail of service</issue>
<issue tracker="cve" id="2024-31227"/>
<issue tracker="cve" id="2024-31228"/>
<issue tracker="cve" id="2024-31449"/>
<packager>ateixeira</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for redis</summary>
<description>This update for redis fixes the following issues:
- CVE-2024-31227: parsing issue leading to denail of service (bsc#1231266)
- CVE-2024-31228: prevent unbounded recursive pattern matching (bsc#1231265)
- CVE-2024-31449: integer overflow bug in Lua bit_tohex (bsc#1231264)
</description>
<package>redis</package>
<seperate_build_arch/>
</patchinfo>