Your message dated Wed, 12 Jul 2023 09:21:01 +0000
with message-id <e1qjw1t-005z3s...@fasolo.debian.org>
and subject line Bug#1040879: fixed in redis 5:7.2-rc3-1
has caused the Debian Bug report #1040879,
regarding redis: CVE-2023-36824: Heap overflow in COMMAND GETKEYS and ACL
evaluation
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
1040879: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1040879
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: redis
Version: 5:7.0.11-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi,
The following vulnerability was published for redis.
CVE-2023-36824[0]:
| Redis is an in-memory database that persists on disk. In Redit 7.0
| prior to 7.0.12, extracting key names from a command and a list of
| arguments may, in some cases, trigger a heap overflow and result in
| reading random heap memory, heap corruption and potentially remote
| code execution. Several scenarios that may lead to authenticated
| users executing a specially crafted `COMMAND GETKEYS` or `COMMAND
| GETKEYSANDFLAGS`and authenticated users who were set with ACL rules
| that match key names, executing a specially crafted command that
| refers to a variadic list of key names. The vulnerability is patched
| in Redis 7.0.12.
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2023-36824
https://www.cve.org/CVERecord?id=CVE-2023-36824
[1] https://github.com/redis/redis/security/advisories/GHSA-4cfx-h9gq-xpx3
Regards,
Salvatore
--- End Message ---
--- Begin Message ---
Source: redis
Source-Version: 5:7.2-rc3-1
Done: Chris Lamb <la...@debian.org>
We believe that the bug you reported is fixed in the latest version of
redis, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 1040...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chris Lamb <la...@debian.org> (supplier of updated redis package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 12 Jul 2023 09:57:10 +0100
Source: redis
Built-For-Profiles: nocheck
Architecture: source
Version: 5:7.2-rc3-1
Distribution: experimental
Urgency: high
Maintainer: Chris Lamb <la...@debian.org>
Changed-By: Chris Lamb <la...@debian.org>
Closes: 1040879
Changes:
redis (5:7.2-rc3-1) experimental; urgency=high
.
* New upstream security release.
<https://raw.githubusercontent.com/redis/redis/7.2/00-RELEASENOTES>
.
- CVE-2022-24834: A specially-crafted Lua script executing in Redis could
have triggered a heap overflow in the cjson and cmsgpack libraries and
result in heap corruption and potentially remote code execution. The
problem exists in all versions of Redis with Lua scripting support and
affects only authenticated/authorised users.
.
- CVE-2023-36824: Extracting key names from a command and a list of
arguments may, in some cases, have triggered a heap overflow and result
in reading random heap memory, heap corruption and potentially remote
code execution. (Specifically using COMMAND GETKEYS* and validation of
key names in ACL rules). (Closes: #1040879)
.
* Refresh patches
Checksums-Sha1:
b63d6087c49c6e79b562c946a5c2af6aa9d85ca4 2245 redis_7.2-rc3-1.dsc
a52b4341b11246b6938ee71d59c2f50b78e112cb 3417862 redis_7.2-rc3.orig.tar.gz
177e7fb946b1a8b41fd3e2382526d4084689894a 28528 redis_7.2-rc3-1.debian.tar.xz
a2757732e612dc716a34c7ca3077238a296443c7 7496 redis_7.2-rc3-1_amd64.buildinfo
Checksums-Sha256:
b4ec260b2f5d47b39bf2a471a8471f6a4b09e7f98f1620a8eb64e90d74a1a312 2245
redis_7.2-rc3-1.dsc
d4e116a7c968442523c00c20c65bc541ae8974964f340dbe07993e39e3fd48ef 3417862
redis_7.2-rc3.orig.tar.gz
13b1fd8e170278bfa2b563b70ab7e069b2ac8cb6fa9a970feb212903ba15324e 28528
redis_7.2-rc3-1.debian.tar.xz
d87d0bfc9fcd61c942ac9640dd2e64d0004f5a93f115f53304aea6567d93b1a3 7496
redis_7.2-rc3-1_amd64.buildinfo
Files:
3a961e24be27ab34805217b6c51a8a2d 2245 database optional redis_7.2-rc3-1.dsc
a697dc73568c6dea45a16deb7e8668ef 3417862 database optional
redis_7.2-rc3.orig.tar.gz
57d51aec85914476a3541de538716d66 28528 database optional
redis_7.2-rc3-1.debian.tar.xz
362e461ca4ed686d21813206a40a941b 7496 database optional
redis_7.2-rc3-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=ItXH
-----END PGP SIGNATURE-----
--- End Message ---