OESA-2024-2270

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2024-2270
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2024-2270.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2024-2270
Upstream
Published
2024-10-18T11:09:24Z
Modified
2025-08-12T05:39:20.333206Z
Summary
redis security update
Details

Redis is an advanced key-value store. It is often referred to as a dattructure server since keys can contain strings, hashes ,lists, sets anorted sets.

Security Fix(es):

Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.(CVE-2023-45145)

Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2024-31228)

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.(CVE-2024-31449)

Database specific
{
    "severity": "High"
}
References

Affected packages

openEuler:24.03-LTS / redis

Package

Name
redis
Purl
pkg:rpm/openEuler/redis&distro=openEuler-24.03-LTS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.14-7.oe2403

Ecosystem specific

{
    "src": [
        "redis-4.0.14-7.oe2403.src.rpm"
    ],
    "x86_64": [
        "redis-4.0.14-7.oe2403.x86_64.rpm",
        "redis-debuginfo-4.0.14-7.oe2403.x86_64.rpm",
        "redis-debugsource-4.0.14-7.oe2403.x86_64.rpm"
    ],
    "aarch64": [
        "redis-4.0.14-7.oe2403.aarch64.rpm",
        "redis-debuginfo-4.0.14-7.oe2403.aarch64.rpm",
        "redis-debugsource-4.0.14-7.oe2403.aarch64.rpm"
    ]
}