openSUSE-SU-2020:1035-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2020:1035-1.json
JSON Data
https://api.osv.dev/v1/vulns/openSUSE-SU-2020:1035-1
Related
Published
2020-07-23T04:21:54Z
Modified
2020-07-23T04:21:54Z
Summary
Security update for redis
Details

This update for redis fixes the following issues:

  • CVE-2020-14147: Context dependent attackers with permission to run Lua code in a Redis session could have caused a denial of service (memory corruption and application crash) or possibly bypass sandbox restrictions (boo#1173018)
References

Affected packages

SUSE:Package Hub 12 / redis

Package

Name
redis
Purl
pkg:rpm/suse/redis&distro=SUSE%20Package%20Hub%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.14-bp151.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "redis": "4.0.14-bp151.3.6.1"
        }
    ]
}

SUSE:Package Hub 15 SP1 / redis

Package

Name
redis
Purl
pkg:rpm/suse/redis&distro=SUSE%20Package%20Hub%2015%20SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.14-bp151.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "redis": "4.0.14-bp151.3.6.1"
        }
    ]
}

openSUSE:Leap 15.1 / redis

Package

Name
redis
Purl
pkg:rpm/opensuse/redis&distro=openSUSE%20Leap%2015.1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.14-bp151.3.6.1

Ecosystem specific

{
    "binaries": [
        {
            "redis": "4.0.14-bp151.3.6.1"
        }
    ]
}