drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Redis
| Name: |
Mehrere Probleme in Redis |
|
| ID: |
USN-7321-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Mi, 5. März 2025, 23:25 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2024-51741
https://www.cve.org/CVERecord?id=CVE-2024-31228
https://www.cve.org/CVERecord?id=CVE-2024-46981
https://launchpad.net/ubuntu/+source/redis/5:7.0.15-1ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/redis/5:7.0.15-1ubuntu0.24.10.1 |
|
| Applikationen: |
Redis |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5258668489847771672== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------kQYstvNJeACtyVpKEW0cjTiC"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------kQYstvNJeACtyVpKEW0cjTiC Content-Type: multipart/mixed; boundary="------------9RD8xZSRyd99WT2ODZME0I2F"; protected-headers="v1" From: Shishir Subedi <shishir.subedi@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <1c76cb3d-5098-4164-897e-78270c7b07d0@canonical.com> Subject: [USN-7321-1] Redis vulnerabilities
--------------9RD8xZSRyd99WT2ODZME0I2F Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7321-1 March 05, 2025
redis vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Redis.
Software Description: - redis: Persistent key-value database with network interface
Details:
It was discovered that Redis incorrectly handled certain memory operations during pattern matching. An attacker could possibly use this issue to cause a denial of service. (CVE-2024-31228)
It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2024-46981)
It was discovered that Redis incorrectly handled some malformed ACL selectors. An attacker could possibly use this issue to cause a denial of service. This issue only affected Ubuntu 24.10 and Ubuntu 24.04 LTS. (CVE-2024-51741)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 redis-server 5:7.0.15-1ubuntu0.24.10.1 redis-tools 5:7.0.15-1ubuntu0.24.10.1
Ubuntu 24.04 LTS redis-server 5:7.0.15-1ubuntu0.24.04.1 redis-tools 5:7.0.15-1ubuntu0.24.04.1
Ubuntu 22.04 LTS redis-server 5:6.0.16-1ubuntu1+esm2 Available with Ubuntu Pro redis-tools 5:6.0.16-1ubuntu1+esm2 Available with Ubuntu Pro
Ubuntu 20.04 LTS redis-server 5:5.0.7-2ubuntu0.1+esm3 Available with Ubuntu Pro redis-tools 5:5.0.7-2ubuntu0.1+esm3 Available with Ubuntu Pro
Ubuntu 18.04 LTS redis-server 5:4.0.9-1ubuntu0.2+esm5 Available with Ubuntu Pro redis-tools 5:4.0.9-1ubuntu0.2+esm5 Available with Ubuntu Pro
Ubuntu 16.04 LTS redis-server 2:3.0.6-1ubuntu0.4+esm3 Available with Ubuntu Pro redis-tools 2:3.0.6-1ubuntu0.4+esm3 Available with Ubuntu Pro
Ubuntu 14.04 LTS redis-server 2:2.8.4-2ubuntu0.2+esm4 Available with Ubuntu Pro redis-tools 2:2.8.4-2ubuntu0.2+esm4 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7321-1 CVE-2024-31228, CVE-2024-46981, CVE-2024-51741
Package Information: https://launchpad.net/ubuntu/+source/redis/5:7.0.15-1ubuntu0.24.10.1 https://launchpad.net/ubuntu/+source/redis/5:7.0.15-1ubuntu0.24.04.1 --------------9RD8xZSRyd99WT2ODZME0I2F--
--------------kQYstvNJeACtyVpKEW0cjTiC Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wnsEABYIACMWIQSyA9nA4R5iZYAVzFrgLM9xllPy5AUCZ8h5/wUDAAAAAAAKCRDgLM9xllPy5Hm8 AP0URXnVo66XlRy5h+nF9gUNyOZlFBKvTn8q3nHWfcSPiQD9Fg376HPOVmE+DBIx//vN1UN4p9by vj/yNwuOMLVaxw0= =w3Qe -----END PGP SIGNATURE-----
--------------kQYstvNJeACtyVpKEW0cjTiC--
--===============5258668489847771672== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============5258668489847771672==--
|
|
|
|