Bug 33643 - redis new security issues CVE-2024-3122[78] and CVE-2024-31449
Summary: redis new security issues CVE-2024-3122[78] and CVE-2024-31449
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-10-15 10:13 CEST by Nicolas Salguero
Modified: 2024-10-27 03:38 CET (History)
6 users (show)

See Also:
Source RPM: redis-7.0.14-1.mga9.src.rpm
CVE: CVE-2024-31227, CVE-2024-31228, CVE-2024-31449
Status comment:


Attachments

Nicolas Salguero 2024-10-15 10:14:28 CEST

Source RPM: (none) => redis-7.0.14-1.mga9.src.rpm
Status comment: (none) => Patches available from Debian
CVE: (none) => CVE-2024-31227, CVE-2024-31228, CVE-2024-31449

Comment 1 Marja Van Waes 2024-10-15 15:54:59 CEST
@ Colin

Assigning to you, because you are the registered maintainer. Can you please give this package to nobody?
Of course, if you want to come back instead, that would be much better :-þ

CC'ing daviddavid, who was the most recent one to touch redis in Cauldron, and kekepower, who was the most recent one to touch it in Mageia 9

Assignee: bugsquad => mageia
CC: (none) => geiger.david68210, marja11, smelror

Comment 2 Marja Van Waes 2024-10-16 14:39:53 CEST
Reassigning to pkg-bugs@ml, this package should be released soon

Assignee: mageia => pkg-bugs

Comment 3 Nicolas Salguero 2024-10-24 09:27:08 CEST
Suggested advisory:
========================

The updated package fixes security vulnerabilities:

An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. (CVE-2024-31227)

Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. (CVE-2024-31228)

An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. (CVE-2024-31449)

References:
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EMP3URK6CE4LGQZ7V2GD23UVMTFM7K46/
========================

Updated package in core/updates_testing:
========================
redis-7.0.14-1.1.mga9

from SRPM:
redis-7.0.14-1.1.mga9.src.rpm

Status comment: Patches available from Debian => (none)
Status: NEW => ASSIGNED
Assignee: pkg-bugs => qa-bugs

katnatek 2024-10-24 19:33:12 CEST

Keywords: (none) => advisory

Comment 4 Herman Viaene 2024-10-26 11:43:43 CEST
MGA9-64 Plasma Wayland on HP--Pavillion
No installation issues
Ref  bug 32406 Comment 5 for testing
# systemctl start redis
# systemctl -l status redis
● redis.service - Redis persistent key-value database
     Loaded: loaded (/usr/lib/systemd/system/redis.service; disabled; preset: disabled)
    Drop-In: /usr/lib/systemd/system/redis.service.d
             └─limit.conf
     Active: active (running) since Sat 2024-10-26 11:40:39 CEST; 16s ago
   Main PID: 125956 (redis-server)
      Tasks: 5 (limit: 4473)
     Memory: 2.4M
        CPU: 95ms
     CGroup: /system.slice/redis.service
             └─125956 "/usr/bin/redis-server 127.0.0.1:6379"

Oct 26 11:40:39 mach4.hviaene.thuis systemd[1]: Started redis.service.

Good enough, let go.

CC: (none) => herman.viaene
Whiteboard: (none) => MGA9-64-OK

Comment 5 Thomas Andrews 2024-10-27 01:08:23 CEST
Validating.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 6 Mageia Robot 2024-10-27 03:38:04 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2024-0340.html

Status: ASSIGNED => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.