All of lore.kernel.org
 help / color / mirror / Atom feed
From: Titouan Christophe <titouanchristophe@gmail.com>
To: buildroot@busybox.net
Subject: [Buildroot] [PATCH 2020.02.x] package/redis: security bump to version 5.0.11 (CVE-2021-21309)
Date: Tue, 9 Mar 2021 13:22:00 +0100	[thread overview]
Message-ID: <243f8cdf-5a24-6974-32d3-ef92a927a40f@gmail.com> (raw)
In-Reply-To: <20210309112303.28379-1-patrickdepinguin@gmail.com>

Hello Thomas,

Thank you for taking care of 2020.2.x, didn't think of that one.


However, this does not build properly on non-glibc systems:
                              br-arm-full [1/6]: OK
                   br-arm-cortex-a9-glibc [2/6]: OK
                    br-arm-cortex-m4-full [3/6]: SKIPPED
                           br-x86-64-musl [4/6]: FAILED
                       br-arm-full-static [5/6]: SKIPPED
                             sourcery-arm [6/6]: OK
6 builds, 2 skipped, 1 build failed, 0 legal-info failed


The problem has been resolved in Redis 5.0.12 (and 6.0.12, 6.2.1) (see 
https://raw.githubusercontent.com/redis/redis/5.0/00-RELEASENOTES), 
would you use this version instead ?

Best regards,
Titouan

On 9/03/21 12:23, Thomas De Schampheleire wrote:
> From: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com>
> 
> References:
> https://github.com/redis/redis/security/advisories/GHSA-hgj8-vff2-7cjf
> https://nvd.nist.gov/vuln/detail/CVE-2021-21309
> 
> "Impact:
> 
>      An integer overflow bug in 32-bit Redis version 4.0 or newer could be
>      exploited to corrupt the heap and potentially result with remote code
>      execution.
> 
>      Redis 4.0 or newer uses a configurable limit for the maximum supported
>      bulk input size. By default, it is 512MB which is a safe value for all
>      platforms.
> 
>      If the limit is significantly increased, receiving a large request from
>      a client may trigger several integer overflow scenarios, which would
>      result with buffer overflow and heap corruption. We believe this could
>      in certain conditions be exploited for remote code execution.
> 
>      By default, authenticated Redis users have access to all configuration
>      parameters and can therefore use the ?CONFIG SET proto-max-bulk-len? to
>      change the safe default, making the system vulnerable.
> 
>      This problem only affects 32-bit Redis (on a 32-bit system, or as a
>      32-bit executable running on a 64-bit system).
> 
> Patches
> 
>      The problem is fixed in version 6.2, and the fix is back ported to
>      6.0.11 and 5.0.11. Make sure you use one of these versions if you're
>      running 32-bit Redis.
> "
> 
> Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire@nokia.com>
> ---
> 
> NOTE: this only applies to 2020.02.x.
> - For 2020.11.x a bump to 6.0.11 or later is needed (e.g. backport commit cbd5f7e3a9331).
> - For 2021.02, 6.0.12 is used which already contains the fix.
> 
> 
>   package/redis/redis.hash | 2 +-
>   package/redis/redis.mk   | 2 +-
>   2 files changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/package/redis/redis.hash b/package/redis/redis.hash
> index 73e28fac0d..9904736502 100644
> --- a/package/redis/redis.hash
> +++ b/package/redis/redis.hash
> @@ -1,5 +1,5 @@
>   # From https://github.com/antirez/redis-hashes/blob/master/README
> -sha256 e30a5e7d1593a715cdda2a82deb90190816d06c9d1dc1ef5b36874878c683382  redis-5.0.10.tar.gz
> +sha256 418135c453a94aac24c24243b041fb978fcc3ea4e1e1f996c1d64b16ae6ac1aa  redis-5.0.11.tar.gz
>   
>   # Locally calculated
>   sha256 cbf420a3672475a6e2765e3c0984c1f81efe0212afb94a3c998ee63bfd661063  COPYING
> diff --git a/package/redis/redis.mk b/package/redis/redis.mk
> index 5ab1d34fd2..eaf0521f2f 100644
> --- a/package/redis/redis.mk
> +++ b/package/redis/redis.mk
> @@ -4,7 +4,7 @@
>   #
>   ################################################################################
>   
> -REDIS_VERSION = 5.0.10
> +REDIS_VERSION = 5.0.11
>   REDIS_SITE = http://download.redis.io/releases
>   REDIS_LICENSE = BSD-3-Clause (core); MIT and BSD family licenses (Bundled components)
>   REDIS_LICENSE_FILES = COPYING
> 

  reply	other threads:[~2021-03-09 12:22 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-03-09 11:23 [Buildroot] [PATCH 2020.02.x] package/redis: security bump to version 5.0.11 (CVE-2021-21309) Thomas De Schampheleire
2021-03-09 12:22 ` Titouan Christophe [this message]
2021-03-13 16:06 ` Peter Korsgaard
2021-03-13 18:24   ` Thomas De Schampheleire

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=243f8cdf-5a24-6974-32d3-ef92a927a40f@gmail.com \
    --to=titouanchristophe@gmail.com \
    --cc=buildroot@busybox.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.