Summary: | <dev-db/redis-2.6.7: Two insecure temporary file use flaws (CVE-2013-{0178,0180}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | bugs, lu_zero, proxy-maint, robbat2 |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2013/01/14/3 | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-01-14 20:07:42 UTC
1: Since we only have newer than 2.6.7 in tree, I'm therefore assuming that 2.6 is safe (from a gentoo perspective)? 2: Just checked the 2.4 branch, and this code at least still seems to be in there. Here's the following commit to the offending line in unstable/2.6 branch: https://github.com/antirez/redis/commit/4ab988238f7418d018bf4412c6c956845ffbeab9 The two branches are diverging and neither patches will apply cleanly to a 2.4. Has this been reported upstream? Johan, can you look for upstream reports for 2.4.x/report it upstream? fwiw, I emailed upstream at January 25th. No response yet. Johan, any news here? Is this still relevant? Unfortunately no. I don't think upstream has officially "accepted" it. Haven't really found that any other distros seems to carry a patch for it. I could partly be blamed for not searching enough though. As of today, v2.4 branch is still affected: https://github.com/antirez/redis/blob/2.4/src/redis.c#L847. In other words we can expect that CVE-2013-0178 will be never fixed. CVE-2013-0180 which was assigned for the same problem in v2.6 branch and got fixed according to "git log -S "/tmp" src/redis.c" (command must be run in 2.6 branch) when upstream removed diskstore via https://github.com/antirez/redis/commit/c9d0c3623a7714bd41a35237f4ba927206a7adb6. $ git tag --contains c9d0c3623a7714bd41a35237f4ba927206a7adb6 | sort 2.6.0 2.6.0-rc1 2.6.0-rc2 2.6.0-rc3 2.6.0-rc4 2.6.0-rc5 2.6.0-rc6 2.6.0-rc7 2.6.0-rc8 2.6.1 [...] ...so I don't understand why a CVE was ever assigned for v2.6.0 because no v2.6 release ever tagged created something in /tmp. Anyways, v2.6.7 was the first version which appeared in Gentoo repository not containing the flaw, see https://sources.gentoo.org/cgi-bin/viewvc.cgi/gentoo-x86/dev-db/redis/redis-2.6.7.ebuild?hideattic=0&view=log As of today the first stable redis version in Gentoo repository is =dev-db/redis-2.8.17-r1 and no vulnerable versions left. So nothing left to do for us. @ Security: Please vote! GLSA Vote: No |