[Buildroot] [PATCH 2020.02.x] package/redis: security bump to version 5.0.11 (CVE-2021-21309)

Titouan Christophe titouanchristophe at gmail.com
Tue Mar 9 12:22:00 UTC 2021


Hello Thomas,

Thank you for taking care of 2020.2.x, didn't think of that one.


However, this does not build properly on non-glibc systems:
                              br-arm-full [1/6]: OK
                   br-arm-cortex-a9-glibc [2/6]: OK
                    br-arm-cortex-m4-full [3/6]: SKIPPED
                           br-x86-64-musl [4/6]: FAILED
                       br-arm-full-static [5/6]: SKIPPED
                             sourcery-arm [6/6]: OK
6 builds, 2 skipped, 1 build failed, 0 legal-info failed


The problem has been resolved in Redis 5.0.12 (and 6.0.12, 6.2.1) (see 
https://raw.githubusercontent.com/redis/redis/5.0/00-RELEASENOTES), 
would you use this version instead ?

Best regards,
Titouan

On 9/03/21 12:23, Thomas De Schampheleire wrote:
> From: Thomas De Schampheleire <thomas.de_schampheleire at nokia.com>
> 
> References:
> https://github.com/redis/redis/security/advisories/GHSA-hgj8-vff2-7cjf
> https://nvd.nist.gov/vuln/detail/CVE-2021-21309
> 
> "Impact:
> 
>      An integer overflow bug in 32-bit Redis version 4.0 or newer could be
>      exploited to corrupt the heap and potentially result with remote code
>      execution.
> 
>      Redis 4.0 or newer uses a configurable limit for the maximum supported
>      bulk input size. By default, it is 512MB which is a safe value for all
>      platforms.
> 
>      If the limit is significantly increased, receiving a large request from
>      a client may trigger several integer overflow scenarios, which would
>      result with buffer overflow and heap corruption. We believe this could
>      in certain conditions be exploited for remote code execution.
> 
>      By default, authenticated Redis users have access to all configuration
>      parameters and can therefore use the “CONFIG SET proto-max-bulk-len” to
>      change the safe default, making the system vulnerable.
> 
>      This problem only affects 32-bit Redis (on a 32-bit system, or as a
>      32-bit executable running on a 64-bit system).
> 
> Patches
> 
>      The problem is fixed in version 6.2, and the fix is back ported to
>      6.0.11 and 5.0.11. Make sure you use one of these versions if you're
>      running 32-bit Redis.
> "
> 
> Signed-off-by: Thomas De Schampheleire <thomas.de_schampheleire at nokia.com>
> ---
> 
> NOTE: this only applies to 2020.02.x.
> - For 2020.11.x a bump to 6.0.11 or later is needed (e.g. backport commit cbd5f7e3a9331).
> - For 2021.02, 6.0.12 is used which already contains the fix.
> 
> 
>   package/redis/redis.hash | 2 +-
>   package/redis/redis.mk   | 2 +-
>   2 files changed, 2 insertions(+), 2 deletions(-)
> 
> diff --git a/package/redis/redis.hash b/package/redis/redis.hash
> index 73e28fac0d..9904736502 100644
> --- a/package/redis/redis.hash
> +++ b/package/redis/redis.hash
> @@ -1,5 +1,5 @@
>   # From https://github.com/antirez/redis-hashes/blob/master/README
> -sha256 e30a5e7d1593a715cdda2a82deb90190816d06c9d1dc1ef5b36874878c683382  redis-5.0.10.tar.gz
> +sha256 418135c453a94aac24c24243b041fb978fcc3ea4e1e1f996c1d64b16ae6ac1aa  redis-5.0.11.tar.gz
>   
>   # Locally calculated
>   sha256 cbf420a3672475a6e2765e3c0984c1f81efe0212afb94a3c998ee63bfd661063  COPYING
> diff --git a/package/redis/redis.mk b/package/redis/redis.mk
> index 5ab1d34fd2..eaf0521f2f 100644
> --- a/package/redis/redis.mk
> +++ b/package/redis/redis.mk
> @@ -4,7 +4,7 @@
>   #
>   ################################################################################
>   
> -REDIS_VERSION = 5.0.10
> +REDIS_VERSION = 5.0.11
>   REDIS_SITE = http://download.redis.io/releases
>   REDIS_LICENSE = BSD-3-Clause (core); MIT and BSD family licenses (Bundled components)
>   REDIS_LICENSE_FILES = COPYING
> 


More information about the buildroot mailing list