MGASA-2024-0340

Source
https://advisories.mageia.org/MGASA-2024-0340.html
Import Source
https://advisories.mageia.org/MGASA-2024-0340.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0340
Related
Published
2024-10-27T02:37:06Z
Modified
2024-10-27T02:12:49Z
Summary
Updated redis packages fix security vulnerabilities
Details

An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. (CVE-2024-31227) Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. (CVE-2024-31228) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. (CVE-2024-31449)

References
Credits

Affected packages

Mageia:9 / redis

Package

Name
redis
Purl
pkg:rpm/mageia/redis?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.14-1.1.mga9

Ecosystem specific

{
    "section": "core"
}