ESB-2018.1779 - [Win][UNIX/Linux][Debian] redis: Multiple vulnerabilities 2018-06-18

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.1779
                           redis security update
                               18 June 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           redis
Publisher:         Debian
Operating System:  Debian GNU/Linux 9
                   UNIX variants (UNIX, Linux, OSX)
                   Windows
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-11219 CVE-2018-11218 

Original Bulletin: 
   http://www.debian.org/security/2018/dsa-4230

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running redis check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4230-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
June 17, 2018                         https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : redis
CVE ID         : CVE-2018-11218 CVE-2018-11219

Multiple vulnerabilities were discovered in the Lua subsystem of Redis, a
persistent key-value database, which could result in denial of service.

For the stable distribution (stretch), these problems have been fixed in
version 3:3.2.6-3+deb9u1.

We recommend that you upgrade your redis packages.

For the detailed security status of redis please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/redis

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=yYx+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=md71
-----END PGP SIGNATURE-----

« Back to bulletins