redis (2:3.0.6-1ubuntu0.2) xenial-security; urgency=medium
* SECURITY UPDATE: Permissions issue
- debian/patches/CVE-2013-7458.patch: fix in
deps/linenoise/linenoise.c.
- CVE-2013-7458
* SECURITY UPDATE: Cross protocol scripting
- debian/patches/CVE-2016-10517.patch: fix in
src/redis.c, src/redis.h.
- CVE-2016-10517
* SECURITY UPDATE: Denial of service
- debian/patches/CVE-2017-15047.patch: fix in
src/cluster.c.
- CVE-2017-15047
* SECURITY UPDATE: Memory corruption
- debian/patches/CVE-2018-11218.patch: fix in
deps/lua/src/lua_cmsgpack.c.
- CVE-2018-11218
* SECURITY UPDATE: Integer Overflow
- debian/patches/CVE-2018-11219-*.patch: fix in
deps/lua/src/lua_struct.c.
- CVE-2018-11219
* SECURITY UPDATE: Buffer overflow in the redis-cli
- debian/patches/CVE-2018-12326.patch: fix in
redis-cli.c.
- CVE-2018-12326
Date: 2018-06-27 17:16:12.663220+00:00
Changed-By: leo.barb...@canonical.com (Leonidas S. Barbosa)
Signed-By: Mike Salvatore <mike.salvat...@canonical.com>
https://launchpad.net/ubuntu/+source/redis/2:3.0.6-1ubuntu0.2
Sorry, changesfile not available.
--
Xenial-changes mailing list
Xenial-changes@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/xenial-changes