summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDivya Chellam <divya.chellam@windriver.com>2025-01-31 12:50:58 +0000
committerArmin Kuster <akuster808@gmail.com>2025-02-09 07:55:11 -0800
commit58aae3874f304e54446d37e5cb5aa24c47300f45 (patch)
treeed613008ed324812fae1b6fb4930e62b9e67111b
parent19592ce1c4d9883645e5c4866a2a94cfcd332d03 (diff)
downloadmeta-openembedded-58aae3874f304e54446d37e5cb5aa24c47300f45.tar.gz
redis: fix CVE-2024-31227
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. Reference: https://security-tracker.debian.org/tracker/CVE-2024-31227 Upstream-patch: https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-oe/recipes-extended/redis/redis-7.0.13/CVE-2024-31227.patch33
-rw-r--r--meta-oe/recipes-extended/redis/redis_7.0.13.bb1
2 files changed, 34 insertions, 0 deletions
diff --git a/meta-oe/recipes-extended/redis/redis-7.0.13/CVE-2024-31227.patch b/meta-oe/recipes-extended/redis/redis-7.0.13/CVE-2024-31227.patch
new file mode 100644
index 0000000000..0998fb2bfb
--- /dev/null
+++ b/meta-oe/recipes-extended/redis/redis-7.0.13/CVE-2024-31227.patch
@@ -0,0 +1,33 @@
1From b351d5a3210e61cc3b22ba38a723d6da8f3c298a Mon Sep 17 00:00:00 2001
2From: Oran Agra <oran@redislabs.com>
3Date: Wed, 2 Oct 2024 20:01:14 +0300
4Subject: [PATCH] Fix ACL SETUSER Read/Write key pattern selector
5 (CVE-2024-31227)
6
7The '%' rule must contain one or both of R/W
8
9CVE: CVE-2024-31227
10
11Upstream-Status: Backport [https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a]
12
13Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
14---
15 src/acl.c | 2 +-
16 1 file changed, 1 insertion(+), 1 deletion(-)
17
18diff --git a/src/acl.c b/src/acl.c
19index 6d86093..6b53d90 100644
20--- a/src/acl.c
21+++ b/src/acl.c
22@@ -1036,7 +1036,7 @@ int ACLSetSelector(aclSelector *selector, const char* op, size_t oplen) {
23 flags |= ACL_READ_PERMISSION;
24 } else if (toupper(op[offset]) == 'W' && !(flags & ACL_WRITE_PERMISSION)) {
25 flags |= ACL_WRITE_PERMISSION;
26- } else if (op[offset] == '~') {
27+ } else if (op[offset] == '~' && flags) {
28 offset++;
29 break;
30 } else {
31--
322.40.0
33
diff --git a/meta-oe/recipes-extended/redis/redis_7.0.13.bb b/meta-oe/recipes-extended/redis/redis_7.0.13.bb
index caccf01f64..6a2a7ce966 100644
--- a/meta-oe/recipes-extended/redis/redis_7.0.13.bb
+++ b/meta-oe/recipes-extended/redis/redis_7.0.13.bb
@@ -18,6 +18,7 @@ SRC_URI = "http://download.redis.io/releases/${BP}.tar.gz \
18 file://0006-Define-correct-gregs-for-RISCV32.patch \ 18 file://0006-Define-correct-gregs-for-RISCV32.patch \
19 file://CVE-2023-41056.patch \ 19 file://CVE-2023-41056.patch \
20 file://CVE-2023-45145.patch \ 20 file://CVE-2023-45145.patch \
21 file://CVE-2024-31227.patch \
21 " 22 "
22SRC_URI[sha256sum] = "97065774d5fb8388eb0d8913458decfcb167d356e40d31dd01cd30c1cc391673" 23SRC_URI[sha256sum] = "97065774d5fb8388eb0d8913458decfcb167d356e40d31dd01cd30c1cc391673"
23 24