it-securitynotifies AT lists.piratenpartei.de
Betreff: Sicherheitsankündigungen
Listenarchiv
- From: Moritz Muehlenhoff <jmm AT debian.org>
- To: debian-security-announce AT lists.debian.org
- Subject: [IT-SecNots] [SECURITY] [DSA 5081-1] redis security update
- Date: Fri, 18 Feb 2022 19:05:16 +0000
- List-archive: https://lists.debian.org/msgid-search/20220218190516.GB19601 AT seger.debian.org
- List-id: <debian-security-announce.lists.debian.org>
- List-url: <http://lists.debian.org/debian-security-announce/>
- Old-dkim-signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=debian.org; s=smtpauto.seger; h=Content-Type:MIME-Version:Message-ID:Subject:To:From: Date:Reply-To:Cc:Content-Transfer-Encoding:Content-ID:Content-Description: In-Reply-To:References; bh=FjLIyF9Pu5vhcalIWeKhtXXNULFAaSjwxh4RdkejJc0=; b=oh 7PkociISjMEBFmXkgx/dyZ+LGO0etZLiZaPMT0NMXhVeFPZ/zTTC1+zo5Vdt+2FpMctjDt/CokGqB 6bIArhiwN/bRkbR8Mwg/aGXi1gtMKNrmReBfDvJ1Zez4PQw25fSpou5TP8GHsib8YecJ7zJ4WKaN2 pYAo3Zn/r4VFa+pte6MlL3VS/sCa0vJvYuQbLcLlORzPW98jdyPbxDWO1LoBUWE86JtTVNgu0JyJa Jpw3+4RN64yZN3I23pHgMWiXGyveGgM7tGMIMk7yNAHtMx5+i96xLJ7lGTpLJl65jGyJr17oov0Rn jSki5usWn2LlfqbYgFB9PWUyzbW9FN7Q==;
- Old-return-path: <jmm AT seger.debian.org>
- Priority: urgent
- Resent-date: Fri, 18 Feb 2022 19:05:36 +0000 (UTC)
- Resent-from: debian-security-announce AT lists.debian.org
- Resent-message-id: <jKOXOcZ6jcC.A.uBH.A4-DiB@bendel>
- Resent-sender: debian-security-announce-request AT lists.debian.org
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5081-1 security AT debian.org
https://www.debian.org/security/ Moritz Muehlenhoff
February 18, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : redis
CVE ID : CVE-2022-0543
Debian Bug : 1005787
Reginaldo Silva discovered a (Debian-specific) Lua sandbox escape in
Redis, a persistent key-value database.
For the oldstable distribution (buster), this problem has been fixed
in version 5:5.0.14-1+deb10u2.
For the stable distribution (bullseye), this problem has been fixed in
version 5:6.0.16-1+deb11u2.
We recommend that you upgrade your redis packages.
For the detailed security status of redis please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/redis
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce AT lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmIP7GsACgkQEMKTtsN8
TjZKCQ/8DREEhcmRf7ZbW3VSDHNsACeCK8QD+ZqRojpKJ9yJZZRiCItcoHiR34+P
WkQbVphIImYD/W/tGPNPIyaxfVKo+T+DcwoCu1MNIGu25vot52cvMi65MqtRKeks
3btiDGueHWhaCv/9shLqghOqL0/qsjh1wH4C4MMKNjQSjBNlrbrrkyrYYF9jUi2s
JQrLnV6o2SU8b5kUtn11FrZmYLz5tlLMKa+ZmyOABQ8UGoDZwYnPXViHCOA5E9i1
BZDXM39HGZ0WllzZXgLzPwWNVGHbiySHRXq4pZAjwQSB92kmi6s2qSAlUnpTYaOa
jWIVFAj6TlHtoLdP8AkCCbDLXGttPwOU3CkwVZ7HBuvVcyQKsD749Letk7jcvpX8
zqwiZbitZ2vf+4y/kd2cpVAHgYN9ET6FZC7GDbbnAV01LHboKVFRUu+GuelIjmO+
7snvlB4CBR1meVruDBdGAPG/NtPPE/Bdaxx4xxNjlufSxu/AE6kRkdW8tLRNKolF
+DTINQbXM1nIx/Xm9dJXnU7ZzF1vZUMZM8ZAl4rIxSA6BetaUxKB7dBhXACidDxR
Qbf+xqFUCXFBUPpfL5TJ1TJMvVmyqVEf80hRr+cna5uuGpJpI0cugHeuh6aJcDIe
htXpsGFf/xRDDEa5VXsE4B9LnCsFegM/Y97XlN4ojDRbURzyYcM=
=E8bU
-----END PGP SIGNATURE-----
- [IT-SecNots] [SECURITY] [DSA 5081-1] redis security update, Moritz Muehlenhoff, 18.02.2022
Archiv bereitgestellt durch MHonArc 2.6.24.