diff options
| author | Divya Chellam <divya.chellam@windriver.com> | 2025-01-31 12:50:58 +0000 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2025-02-09 07:55:11 -0800 |
| commit | 58aae3874f304e54446d37e5cb5aa24c47300f45 (patch) | |
| tree | ed613008ed324812fae1b6fb4930e62b9e67111b /meta-python/recipes-devtools/python/python-numeric | |
| parent | 19592ce1c4d9883645e5c4866a2a94cfcd332d03 (diff) | |
| download | meta-openembedded-58aae3874f304e54446d37e5cb5aa24c47300f45.tar.gz | |
redis: fix CVE-2024-31227
Redis is an open source, in-memory database that persists on disk.
An authenticated with sufficient privileges may create a malformed
ACL selector which, when accessed, triggers a server panic and
subsequent denial of service. The problem exists in Redis 7 prior
to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There
are no known workarounds for this vulnerability.
Reference:
https://security-tracker.debian.org/tracker/CVE-2024-31227
Upstream-patch:
https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a
Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python-numeric')
0 files changed, 0 insertions, 0 deletions
