-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3361-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Chris Lamb March 13, 2023 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : redis Version : 5:5.0.14-1+deb10u3 CVE ID : CVE-2022-36021 It was discovered that there was a potential remote denial of service vulnerability in redis, a popular key-value database. Authenticated users could have used string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack, causing it to hang and consume 100% CPU time. For Debian 10 buster, this problem has been fixed in version 5:5.0.14-1+deb10u3. We recommend that you upgrade your redis packages. For the detailed security status of redis please refer to its security tracker page at: https://security-tracker.debian.org/tracker/redis Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmQPVA0ACgkQHpU+J9Qx HlgB+xAAr4Q91170b+DR1WIeJq7YZSp8xkD5mwDWLPyp/1yOHJ+ae8aK58qUPASb RnIknAWZO5pMTRxmmnaf/CHYDLAs8/vf16RXpYL6c0E/Z1EVdZfbkuAr6QBMJ+5o fSo5Ipim2eLy6T3rYfPUVMUpbUbyx1pGrR9EkIOBwYi9JXWygIMcX73YfMDRwFla HLr+8dv7GVmxL1EW8IhxP04SKQYgEHl06IZ5tqWPBQFGHtE7Sj60KZuCX4R2UlW0 Kv3zwkk5uPKEgP0BA8+oV2xy+zf3C6qwZEP3ZvQ7EMdHv7i0lc+46TrbZiFUxPsG 10aarUMKn5qclq0C54/Y9kANCEszBgKLFJ7Cm0s8jWc/2TE2PUrhZgUyqfRJGPaF JpWclI/ZHvsYWA1A7xkko3HYlcMjqOI5nimmJtXsbhDYzaYrRfZTQWZxo8RRvOXh S+oFCfpSlGsnHgpozzwqTcXPlc0Nvv4RGV7EG2/Dzxq1TEPNiSxc+2gtISOcb4Hr ZoqPpMCD5Kpzc4pavRGAKcAxnH/j9eh9w45XCoQfr3Ju5WyrDphaN3Uw2w8K2SYJ S3L1ZHkvvWxJXGTBeKILHRxCHYqG4wmmiT/bze5/dVrz60jOVcz+yR7mKKfMxgww //fodg9p9tbItH2k0zMR0UPQfYXWHkVuNKlwUSzaYuk5K5hErBw= =phBr -----END PGP SIGNATURE-----