Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 10 Jan 2025 05:24:09 GMT
From:      Yasuhiro Kimura <yasu@FreeBSD.org>
To:        ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org
Subject:   git: aefdc1ec77ef - main - security/vuxml: Document two valnerabilities in redis and valkey
Message-ID:  <202501100524.50A5O9QV073865@gitrepo.freebsd.org>

next in thread | raw e-mail | index | archive | help
The branch main has been updated by yasu:

URL: https://cgit.FreeBSD.org/ports/commit/?id=aefdc1ec77ef09b119d9801f2363e1653720bb38

commit aefdc1ec77ef09b119d9801f2363e1653720bb38
Author:     Yasuhiro Kimura <yasu@FreeBSD.org>
AuthorDate: 2025-01-10 05:20:05 +0000
Commit:     Yasuhiro Kimura <yasu@FreeBSD.org>
CommitDate: 2025-01-10 05:23:35 +0000

    security/vuxml: Document two valnerabilities in redis and valkey
    
    While here, update copyright year
---
 security/vuxml/vuln.xml      |  2 +-
 security/vuxml/vuln/2025.xml | 82 ++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 83 insertions(+), 1 deletion(-)

diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index ba7314a9e226..f5af9b864a2a 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -25,7 +25,7 @@
 <!ENTITY vuln-2025 SYSTEM "vuln/2025.xml">
 ]>
 <!--
-Copyright 2003-2024 Jacques Vidrine and contributors
+Copyright 2003-2025 Jacques Vidrine and contributors
 
 Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
 HTML, PDF, PostScript, RTF and so forth) with or without modification,
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 5588926228b8..f4e44f9d9f30 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,85 @@
+  <vuln vid="4d79fd1a-cc93-11ef-abed-08002784c58d">
+    <topic>redis,valkey -- Denial-of-service valnerability due to malformed ACL selectors</topic>
+    <affects>
+      <package>
+	<name>redis</name>
+	<range><ge>7.0.0</ge><lt>7.4.2</lt></range>
+      </package>
+      <package>
+	<name>redis72</name>
+	<range><lt>7.2.7</lt></range>
+      </package>
+      <package>
+	<name>valkey</name>
+	<range><lt>8.0.2</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Redis core team reports:</p>
+	<blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-prpq-rh5h-46g9">;
+	  <p>
+	    An authenticated with sufficient privileges may create a
+	    malformed ACL selector which, when accessed, triggers a
+	    server panic and subsequent denial of service.The problem
+	    exists in Redis 7.0.0 or newer.
+	  </p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-51741</cvename>
+      <url>https://github.com/redis/redis/security/advisories/GHSA-prpq-rh5h-46g9</url>;
+    </references>
+    <dates>
+      <discovery>2025-01-06</discovery>
+      <entry>2025-01-10</entry>
+    </dates>
+  </vuln>
+
+  <vuln vid="5f19ac58-cc90-11ef-abed-08002784c58d">
+    <topic>redis,valkey -- Remote code execution valnerability</topic>
+    <affects>
+      <package>
+	<name>redis</name>
+	<range><lt>7.4.2</lt></range>
+      </package>
+      <package>
+	<name>redis72</name>
+	<range><lt>7.2.7</lt></range>
+      </package>
+      <package>
+	<name>redis62</name>
+	<range><lt>6.2.17</lt></range>
+      </package>
+      <package>
+	<name>valkey</name>
+	<range><lt>8.0.2</lt></range>
+      </package>
+    </affects>
+    <description>
+	<body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Redis core team reports:</p>
+	<blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c">;
+	  <p>
+	    An authenticated user may use a specially crafted Lua
+	    script to manipulate the garbage collector and potentially
+	    lead to remote code execution. The problem exists in all
+	    versions of Redis with Lua scripting.
+	  </p>
+	</blockquote>
+	</body>
+    </description>
+    <references>
+      <cvename>CVE-2024-46981</cvename>
+      <url>https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c</url>;
+    </references>
+    <dates>
+      <discovery>2025-01-06</discovery>
+      <entry>2025-01-10</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="2bfde261-cdf2-11ef-b6b2-2cf05da270f3">
     <topic>Gitlab -- Vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202501100524.50A5O9QV073865>