Lucene search

K
debianDebianDEBIAN:DSA-3412-1:9156D
HistoryDec 03, 2015 - 9:06 p.m.

[SECURITY] [DSA 3412-1] redis security update

2015-12-0321:06:43
lists.debian.org
14

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.827 High

EPSS

Percentile

98.4%


Debian Security Advisory DSA-3412-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
December 03, 2015 https://www.debian.org/security/faq


Package : redis
CVE ID : CVE-2015-8080
Debian Bug : 804419

Luca Bruno discovered an integer overflow flaw leading to a stack-based
buffer overflow in redis, a persistent key-value database. A remote
attacker can use this flaw to cause a denial of service (application
crash).

For the stable distribution (jessie), this problem has been fixed in
version 2:2.8.17-1+deb8u3.

For the testing distribution (stretch), this problem has been fixed
in version 2:3.0.5-4.

For the unstable distribution (sid), this problem has been fixed in
version 2:3.0.5-4.

We recommend that you upgrade your redis packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

OSVersionArchitecturePackageVersionFilename
Debian8allredis< 2:2.8.17-1+deb8u3redis_2:2.8.17-1+deb8u3_all.deb

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.827 High

EPSS

Percentile

98.4%