From c096e43b6dfec618a46b1c5a03f256dcfa373b03 Mon Sep 17 00:00:00 2001 From: Chris Lamb Date: Tue, 12 Oct 2021 11:22:44 +0100 Subject: Add DLA-2783-1. --- english/lts/security/2021/dla-2783.data | 9 ++++++++ english/lts/security/2021/dla-2783.wml | 38 +++++++++++++++++++++++++++++++++ 2 files changed, 47 insertions(+) create mode 100644 english/lts/security/2021/dla-2783.data create mode 100644 english/lts/security/2021/dla-2783.wml diff --git a/english/lts/security/2021/dla-2783.data b/english/lts/security/2021/dla-2783.data new file mode 100644 index 00000000000..eb7eb76303a --- /dev/null +++ b/english/lts/security/2021/dla-2783.data @@ -0,0 +1,9 @@ +DLA-2783-1 hiredis +2021-10-12 +CVE-2021-32765 +hiredis +yes +yes +no + +#use wml::debian::security diff --git a/english/lts/security/2021/dla-2783.wml b/english/lts/security/2021/dla-2783.wml new file mode 100644 index 00000000000..74e01016534 --- /dev/null +++ b/english/lts/security/2021/dla-2783.wml @@ -0,0 +1,38 @@ +LTS security update + + +

It was discovered that there was an integer-overflow vulnerability in +hiredis, a C client library for communicating with Redis databases. This +occurred within the handling and parsing of 'multi-bulk' replies.

+ + + +

For Debian 9 Stretch, these problems have been fixed in version +0.13.3-1+deb9u1.

+ +

We recommend that you upgrade your hiredis packages.

+ +

Further information about Debian LTS security advisories, how to apply +these updates to your system and frequently asked questions can be +found at: https://wiki.debian.org/LTS

+
+ +# do not modify the following line +#include "$(ENGLISHDIR)/lts/security/2021/dla-2783.data" +# $Id: $ -- cgit v1.2.3