aboutsummaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-extended/redis/redis_6.2.2.bb
diff options
context:
space:
mode:
authorTony Tascioglu <tony.tascioglu@windriver.com>2021-08-10 11:51:45 -0700
committerArmin Kuster <akuster808@gmail.com>2021-08-14 11:43:12 -0700
commitacf5769aff4edb67b187d70ac339a6484e1cc527 (patch)
treee8f514fc0cfa31537d3d5de0a5335c63a6eeb3b5 /meta-oe/recipes-extended/redis/redis_6.2.2.bb
parentb2c8972406a263fac9e8b8f3a41251b6d451ef10 (diff)
downloadmeta-openembedded-contrib-acf5769aff4edb67b187d70ac339a6484e1cc527.tar.gz
redis: fix CVE-2021-32625
CVE: CVE-2021-32625 Upstream-Status: Backport [e9a1438ac4c52aa68dfa2a8324b6419356842116] Fix integer overflow in STRALGO LCS (CVE-2021-32625) (#9011) An integer overflow bug in Redis version 6.0 or newer can be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. Signed-off-by: Tony Tascioglu <tony.tascioglu@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-oe/recipes-extended/redis/redis_6.2.2.bb')
-rw-r--r--meta-oe/recipes-extended/redis/redis_6.2.2.bb1
1 files changed, 1 insertions, 0 deletions
diff --git a/meta-oe/recipes-extended/redis/redis_6.2.2.bb b/meta-oe/recipes-extended/redis/redis_6.2.2.bb
index a36c190af3..a9e6eaffaa 100644
--- a/meta-oe/recipes-extended/redis/redis_6.2.2.bb
+++ b/meta-oe/recipes-extended/redis/redis_6.2.2.bb
@@ -18,6 +18,7 @@ SRC_URI = "http://download.redis.io/releases/${BP}.tar.gz \
file://0006-Define-correct-gregs-for-RISCV32.patch \
file://fix-CVE-2021-29477.patch \
file://fix-CVE-2021-29478.patch \
+ file://fix-CVE-2021-32625.patch \
"
SRC_URI[sha256sum] = "7a260bb74860f1b88c3d5942bf8ba60ca59f121c6dce42d3017bed6add0b9535"