21 lines
1.1 KiB
Plaintext
21 lines
1.1 KiB
Plaintext
<patchinfo incident="111">
|
|
<!-- generated from request(s) 347693 -->
|
|
<issue tracker="bnc" id="1231264">VUL-0: CVE-2024-31449: redis,valkey,redict: Integer overflow bug in Lua bit_tohex</issue>
|
|
<issue tracker="bnc" id="1231265">VUL-0: CVE-2024-31228: redis,valkey,redict: Prevent unbounded recursive pattern matching</issue>
|
|
<issue tracker="bnc" id="1231266">VUL-0: CVE-2024-31227: redis,valkey,redict: ACL: Fix parsing issue leading to denail of service</issue>
|
|
<issue tracker="cve" id="2024-31227"/>
|
|
<issue tracker="cve" id="2024-31228"/>
|
|
<issue tracker="cve" id="2024-31449"/>
|
|
<packager>ateixeira</packager>
|
|
<rating>important</rating>
|
|
<category>security</category>
|
|
<summary>Security update for redis</summary>
|
|
<description>This update for redis fixes the following issues:
|
|
|
|
- CVE-2024-31227: parsing issue leading to denail of service (bsc#1231266)
|
|
- CVE-2024-31228: prevent unbounded recursive pattern matching (bsc#1231265)
|
|
- CVE-2024-31449: integer overflow bug in Lua bit_tohex (bsc#1231264)
|
|
</description>
|
|
<package>redis</package>
|
|
<seperate_build_arch/>
|
|
</patchinfo> |