Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 872278 (CVE-2022-35951) - <dev-db/redis-7.0.5: XAUTOCLAIM buffer overflow
Summary: <dev-db/redis-7.0.5: XAUTOCLAIM buffer overflow
Status: RESOLVED FIXED
Alias: CVE-2022-35951
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal
Assignee: Gentoo Security
URL:
Whiteboard: B2 [glsa+]
Keywords: PullRequest
Depends on: 872713
Blocks:
  Show dependency tree
 
Reported: 2022-09-22 04:23 UTC by Sam James
Modified: 2022-10-01 17:24 UTC (History)
4 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-09-22 04:23:11 UTC
From 7.0.5 release notes:
"""
    (CVE-2022-35951) Executing a XAUTOCLAIM command on a stream key in a specific
    state, with a specially crafted COUNT argument, may cause an integer overflow,
    a subsequent heap overflow, and potentially lead to remote code execution.
    The problem affects Redis versions 7.0.0 or newer
    [reported by Xion (SeungHyun Lee) of KAIST GoN].
"""

It only affects 7.x, not sure how we'll handle making it the <fixed versions once committed. I guess just <7.0.5.
Comment 1 Larry the Git Cow gentoo-dev 2022-09-22 05:47:58 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=59e3ca6dd662210e3168d7d090a4cf03ff42e81d

commit 59e3ca6dd662210e3168d7d090a4cf03ff42e81d
Author:     Sam James <sam@gentoo.org>
AuthorDate: 2022-09-22 04:36:51 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2022-09-22 05:47:50 +0000

    dev-db/redis: add 7.0.5
    
    Bug: https://bugs.gentoo.org/872278
    Signed-off-by: Sam James <sam@gentoo.org>

 dev-db/redis/Manifest           |   1 +
 dev-db/redis/redis-7.0.5.ebuild | 187 ++++++++++++++++++++++++++++++++++++++++
 2 files changed, 188 insertions(+)
Comment 2 Petr Vaněk gentoo-dev 2022-09-23 11:08:46 UTC
I have been testing version 7.0.5 extensively and it suffers with the same issue reported in bug 860372 (subjectively, it happens more often than in version 7.0.4). However, the upstream fix was not present in this release line. PR #27408 backports it to 7.0.4 and 7.0.5.
Comment 3 Larry the Git Cow gentoo-dev 2022-09-25 01:21:14 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fd92a504228d5932eaaf750ea469e8ed63b3fd04

commit fd92a504228d5932eaaf750ea469e8ed63b3fd04
Author:     Petr Vaněk <arkamar@atlas.cz>
AuthorDate: 2022-09-23 07:53:56 +0000
Commit:     Sam James <sam@gentoo.org>
CommitDate: 2022-09-25 01:20:27 +0000

    dev-db/redis: fix sometime failing tests due to bgsaveerr issue
    
    This change backports patch from upstream PR #11043 in order to properly
    solve bug #872278 reported for version 7.0.4 which affects version 7.0.5
    as well. In upstream, the fix is not part of 7.0 branch, it is only
    present in unstable branch.
    
    Upstream-PR: https://github.com/redis/redis/pull/11043
    Bug: https://bugs.gentoo.org/860372
    Bug: https://bugs.gentoo.org/872278
    Signed-off-by: Petr Vaněk <arkamar@atlas.cz>
    Signed-off-by: Sam James <sam@gentoo.org>

 .../files/redis-7.0.4-replica-tests-fix.patch      | 61 ++++++++++++++++++++++
 dev-db/redis/redis-7.0.4.ebuild                    |  1 +
 dev-db/redis/redis-7.0.5.ebuild                    |  1 +
 3 files changed, 63 insertions(+)
Comment 4 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2022-09-25 01:43:09 UTC
(In reply to Petr Vaněk from comment #2)
> I have been testing version 7.0.5 extensively and it suffers with the same
> issue reported in bug 860372 (subjectively, it happens more often than in
> version 7.0.4). However, the upstream fix was not present in this release
> line. PR #27408 backports it to 7.0.4 and 7.0.5.

Thank you!
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-26 18:06:21 UTC
GLSA request filed
Comment 6 Petr Vaněk gentoo-dev 2022-09-26 18:31:49 UTC
I don't think that bug 873091 blocks any currently open security bug. All known CVEs related to =dev-db/redis-7* are specific to that major version, they don't affect any older version. At least as I understand those descriptions. This means that version dev-db/redis-6.2.7 should be ok and it is not candidate for cleanup, at least for now.
Comment 7 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-26 19:11:07 UTC
(In reply to Petr Vaněk from comment #6)
> I don't think that bug 873091 blocks any currently open security bug. All
> known CVEs related to =dev-db/redis-7* are specific to that major version,
> they don't affect any older version. At least as I understand those
> descriptions. This means that version dev-db/redis-6.2.7 should be ok and it
> is not candidate for cleanup, at least for now.

Which is what I meant in https://bugs.gentoo.org/803302#c13
Comment 8 Petr Vaněk gentoo-dev 2022-09-26 19:22:48 UTC
I see, sorry, I missed that.
Comment 9 Larry the Git Cow gentoo-dev 2022-09-27 07:40:46 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=46c3048bbb93d8bf616ecdd50c972b92cdbc31aa

commit 46c3048bbb93d8bf616ecdd50c972b92cdbc31aa
Author:     Petr Vaněk <arkamar@atlas.cz>
AuthorDate: 2022-09-26 18:33:14 +0000
Commit:     Arthur Zamarin <arthurzam@gentoo.org>
CommitDate: 2022-09-27 07:40:39 +0000

    dev-db/redis: drop 7.0.4
    
    Bug: https://bugs.gentoo.org/872278
    Signed-off-by: Petr Vaněk <arkamar@atlas.cz>
    Closes: https://github.com/gentoo/gentoo/pull/27479
    Signed-off-by: Arthur Zamarin <arthurzam@gentoo.org>

 dev-db/redis/Manifest           |   1 -
 dev-db/redis/redis-7.0.4.ebuild | 188 ----------------------------------------
 2 files changed, 189 deletions(-)
Comment 10 Larry the Git Cow gentoo-dev 2022-09-29 14:48:33 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/data/glsa.git/commit/?id=3b83b8330073185fb5605b449ed900293d014aeb

commit 3b83b8330073185fb5605b449ed900293d014aeb
Author:     GLSAMaker <glsamaker@gentoo.org>
AuthorDate: 2022-09-29 14:21:49 +0000
Commit:     John Helmert III <ajak@gentoo.org>
CommitDate: 2022-09-29 14:47:59 +0000

    [ GLSA 202209-17 ] Redis: Multiple Vulnerabilities
    
    Bug: https://bugs.gentoo.org/803302
    Bug: https://bugs.gentoo.org/816282
    Bug: https://bugs.gentoo.org/841404
    Bug: https://bugs.gentoo.org/856040
    Bug: https://bugs.gentoo.org/859181
    Bug: https://bugs.gentoo.org/872278
    Signed-off-by: GLSAMaker <glsamaker@gentoo.org>
    Signed-off-by: John Helmert III <ajak@gentoo.org>

 glsa-202209-17.xml | 60 ++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 60 insertions(+)
Comment 11 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-29 14:49:57 UTC
GLSA released, all done!
Comment 12 Tomáš Mózes 2022-09-30 06:18:04 UTC
According to the release notes, only 7.x is affected:
"The problem affects Redis versions 7.0.0 or newer"

However, the GLSA also matches systems with redis-6.
Comment 13 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-30 14:33:49 UTC
(In reply to Tomáš Mózes from comment #12)
> According to the release notes, only 7.x is affected:
> "The problem affects Redis versions 7.0.0 or newer"
> 
> However, the GLSA also matches systems with redis-6.

Ugh, you're right, I meant to not release the Redis GLSA due to this. We're not able to make a GLSA target a set of package versions with a lower *and* upper bound, so the only way that I see to rectify this at this point is to remove the GLSA.
Comment 14 Petr Vaněk gentoo-dev 2022-09-30 16:26:49 UTC
(In reply to John Helmert III from comment #13)
> (In reply to Tomáš Mózes from comment #12)
> > According to the release notes, only 7.x is affected:
> > "The problem affects Redis versions 7.0.0 or newer"
> > 
> > However, the GLSA also matches systems with redis-6.
> 
> Ugh, you're right, I meant to not release the Redis GLSA due to this. We're
> not able to make a GLSA target a set of package versions with a lower *and*
> upper bound, so the only way that I see to rectify this at this point is to
> remove the GLSA.

My opinion on this is that this CVE is part of GLSA with bigger bundle of other CVEs, where some of them affect redis-7 only and others older versions only. Still, I think it is better to preserve this GLSA but we can change it to:

  Affected versions:      <6.2.7
                          <7.0.5

  Unaffected versions:   >=6.2.7
                         >=7.0.5

in similar fashion to other bugs, or:

  Affected versions:      <7.0.5

  Unaffected versions:   >=6.2.7
                         >=7.0.5

which I also have seen to be used, but I don't know what exactly is a difference between them.

Anyway, I preffer to inform users, some of those CVEs are RCE with high score.
Comment 15 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-09-30 17:28:44 UTC
(In reply to Petr Vaněk from comment #14)
> (In reply to John Helmert III from comment #13)
> > (In reply to Tomáš Mózes from comment #12)
> > > According to the release notes, only 7.x is affected:
> > > "The problem affects Redis versions 7.0.0 or newer"
> > > 
> > > However, the GLSA also matches systems with redis-6.
> > 
> > Ugh, you're right, I meant to not release the Redis GLSA due to this. We're
> > not able to make a GLSA target a set of package versions with a lower *and*
> > upper bound, so the only way that I see to rectify this at this point is to
> > remove the GLSA.
> 
> My opinion on this is that this CVE is part of GLSA with bigger bundle of
> other CVEs, where some of them affect redis-7 only and others older versions
> only. Still, I think it is better to preserve this GLSA but we can change it
> to:
> 
>   Affected versions:      <6.2.7
>                           <7.0.5
> 
>   Unaffected versions:   >=6.2.7
>                          >=7.0.5
>
> in similar fashion to other bugs, or:
> 
>   Affected versions:      <7.0.5
> 
>   Unaffected versions:   >=6.2.7
>                          >=7.0.5

Seems like both of these mark everything as both unaffected and affected?

> which I also have seen to be used, but I don't know what exactly is a
> difference between them.

These have indeed been used in the past, but they they incorrectly convey the affected versions.

> Anyway, I preffer to inform users, some of those CVEs are RCE with high
> score.
Comment 16 Petr Vaněk gentoo-dev 2022-09-30 20:25:49 UTC
(In reply to John Helmert III from comment #15)
> (In reply to Petr Vaněk from comment #14)
> > My opinion on this is that this CVE is part of GLSA with bigger bundle of
> > other CVEs, where some of them affect redis-7 only and others older versions
> > only. Still, I think it is better to preserve this GLSA but we can change it
> > to:
> > 
> >   Affected versions:      <6.2.7
> >                           <7.0.5
> > 
> >   Unaffected versions:   >=6.2.7
> >                          >=7.0.5
> >
> > in similar fashion to other bugs, or:
> > 
> >   Affected versions:      <7.0.5
> > 
> >   Unaffected versions:   >=6.2.7
> >                          >=7.0.5
> 
> Seems like both of these mark everything as both unaffected and affected?
> 
> > which I also have seen to be used, but I don't know what exactly is a
> > difference between them.
> 
> These have indeed been used in the past, but they they incorrectly convey
> the affected versions.
> 
> > Anyway, I preffer to inform users, some of those CVEs are RCE with high
> > score.

Ok, in that case, according to our wiki [1] (when I follow "more complex case" example) we can define:

  Vulnerable:  <7.0.5
  Unaffected: <=7.0.0 >=7.0.5

for version 7.0 and for version 6.2:

  Vulnerable:  <6.2.7
  Unaffected: >=6.2.7

I am not sure if it would be needed to split it to two GLEPs.

[1] https://wiki.gentoo.org/wiki/Project:Security/GLSA_Coordinator_Guide#Unaffected.2C_Vulnerable_packages
Comment 17 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-10-01 17:24:24 UTC
(In reply to Petr Vaněk from comment #16)
> (In reply to John Helmert III from comment #15)
> > (In reply to Petr Vaněk from comment #14)
> > > My opinion on this is that this CVE is part of GLSA with bigger bundle of
> > > other CVEs, where some of them affect redis-7 only and others older versions
> > > only. Still, I think it is better to preserve this GLSA but we can change it
> > > to:
> > > 
> > >   Affected versions:      <6.2.7
> > >                           <7.0.5
> > > 
> > >   Unaffected versions:   >=6.2.7
> > >                          >=7.0.5
> > >
> > > in similar fashion to other bugs, or:
> > > 
> > >   Affected versions:      <7.0.5
> > > 
> > >   Unaffected versions:   >=6.2.7
> > >                          >=7.0.5
> > 
> > Seems like both of these mark everything as both unaffected and affected?
> > 
> > > which I also have seen to be used, but I don't know what exactly is a
> > > difference between them.
> > 
> > These have indeed been used in the past, but they they incorrectly convey
> > the affected versions.
> > 
> > > Anyway, I preffer to inform users, some of those CVEs are RCE with high
> > > score.
> 
> Ok, in that case, according to our wiki [1] (when I follow "more complex
> case" example) we can define:
> 
>   Vulnerable:  <7.0.5
>   Unaffected: <=7.0.0 >=7.0.5

<=7.0.0 includes all of 6.x, but there are vulnerable 6.x versions.

> for version 7.0 and for version 6.2:
> 
>   Vulnerable:  <6.2.7
>   Unaffected: >=6.2.7

>=6.2.7 includes 7.x, but there's vulnerable 7.x versions.

> I am not sure if it would be needed to split it to two GLEPs.

I don't see how splitting it up into multiple GLSAs could help, seems like it would just spread the inaccuracy across multiple GLSAs. I totally get that this is wrong, but there's really not much we can do here. I'm planning on reworking the GLSA format to accomodate this properly

> [1]
> https://wiki.gentoo.org/wiki/Project:Security/
> GLSA_Coordinator_Guide#Unaffected.2C_Vulnerable_packages