Debian Security Advisory DSA-3412-1 [email protected]
https://www.debian.org/security/ Salvatore Bonaccorso
December 03, 2015 https://www.debian.org/security/faq
Package : redis
CVE ID : CVE-2015-8080
Debian Bug : 804419
Luca Bruno discovered an integer overflow flaw leading to a stack-based
buffer overflow in redis, a persistent key-value database. A remote
attacker can use this flaw to cause a denial of service (application
crash).
For the stable distribution (jessie), this problem has been fixed in
version 2:2.8.17-1+deb8u3.
For the testing distribution (stretch), this problem has been fixed
in version 2:3.0.5-4.
For the unstable distribution (sid), this problem has been fixed in
version 2:3.0.5-4.
We recommend that you upgrade your redis packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 8 | armhf | redis-tools | < 2.8.17-1+deb8u3 | redis-tools_2.8.17-1+deb8u3_armhf.deb |
Debian | 8 | i386 | redis-tools | < 2.8.17-1+deb8u3 | redis-tools_2.8.17-1+deb8u3_i386.deb |
Debian | 8 | powerpc | redis-server | < 2.8.17-1+deb8u3 | redis-server_2.8.17-1+deb8u3_powerpc.deb |
Debian | 8 | ppc64el | redis-tools | < 2.8.17-1+deb8u3 | redis-tools_2.8.17-1+deb8u3_ppc64el.deb |
Debian | 8 | amd64 | redis-tools | < 2.8.17-1+deb8u3 | redis-tools_2.8.17-1+deb8u3_amd64.deb |
Debian | 8 | mipsel | redis-tools | < 2.8.17-1+deb8u3 | redis-tools_2.8.17-1+deb8u3_mipsel.deb |
Debian | 8 | i386 | redis-server | < 2.8.17-1+deb8u3 | redis-server_2.8.17-1+deb8u3_i386.deb |
Debian | 8 | s390x | redis-server | < 2.8.17-1+deb8u3 | redis-server_2.8.17-1+deb8u3_s390x.deb |
Debian | 8 | arm64 | redis-tools | < 2.8.17-1+deb8u3 | redis-tools_2.8.17-1+deb8u3_arm64.deb |
Debian | 8 | armel | redis-server | < 2.8.17-1+deb8u3 | redis-server_2.8.17-1+deb8u3_armel.deb |