Debian Patches

Status for redis/5:6.0.16-1+deb11u5

Patch Description Author Forwarded Bugs Origin Last update
0013-CVE-2023-28856.patch [PATCH] fix hincrbyfloat not to create a key if the new value is invalid (#11149)

Check the validity of the value before performing the create operation,
prevents new data from being generated even if the request fails to execute.

(cherry picked from commit bc7fe41e5857a0854d524e2a63a028e9394d2a5c)
(cherry picked from commit 606a385935363ea46c0df4f40f8a949d85f7a20a)
chendianqiang <c.d_q@163.com> no 2022-08-28
0014-CVE-2023-25155.patch [PATCH] Integer Overflow in RAND commands can lead to assertion (CVE-2023-25155)

Issue happens when passing a negative long value that greater than
the max positive value that the long can store.
Oran Agra <oran@redislabs.com> no 2023-02-21
0015-CVE-2022-36021.patch [PATCH] String pattern matching had exponential time complexity on pathological patterns (CVE-2022-36021)

Authenticated users can use string matching commands with a
specially crafted pattern to trigger a denial-of-service attack on Redis,
causing it to hang and consume 100% CPU time.
Tom Levy <tomlevy93@gmail.com> no 2023-02-21
0016-CVE-2022-24834.patch [PATCH] Lua cjson and cmsgpack integer overflow issues (CVE-2022-24834)

* Fix integer overflows due to using wrong integer size.
* Add assertions / panic when overflow still happens.
* Deletion of dead code to avoid need to maintain it
* Some changes are not because of bugs, but rather paranoia.
* Improve cmsgpack and cjson test coverage.
Oran Agra <oran@redislabs.com> no 2023-07-02
0001-Avoid-integer-overflows-in-SETRANGE-and-SORT-CVE-202.patch Avoid integer overflows in SETRANGE and SORT (CVE-2022-35977) (#11720)

Authenticated users issuing specially crafted SETRANGE and SORT(_RO)
commands can trigger an integer overflow, resulting with Redis attempting
to allocate impossible amounts of memory and abort with an OOM panic.
Oran Agra <oran@redislabs.com> no 2023-01-16
0002-Apply-security-fixes-for-CVEs-1114.patch Apply security fixes for CVEs (#1114)
Apply the security fixes for the release.

(CVE-2024-31228) Potential Denial-of-service due to unbounded pattern
matching.
Madelyn Olson <madelyneolson@gmail.com> no 2024-10-02
0001-Fix-LUA-garbage-collector-CVE-2024-46981-1513.patch Fix LUA garbage collector (CVE-2024-46981) (#1513)
Reset GC state before closing the lua VM to prevent user data to be
wrongly freed while still might be used on destructor callbacks.

Created and publish by Redis in their OSS branch.
Madelyn Olson <madelyneolson@gmail.com> no 2025-01-06
0012-CVE-2023-45145.patch [PATCH] Fix issue of listen before chmod on Unix sockets (CVE-2023-45145)

Before this commit, Unix socket setup performed chmod(2) on the socket
file after calling listen(2). Depending on what umask is used, this
could leave the file with the wrong permissions for a short period of
time. As a result, another process could exploit this race condition and
establish a connection that would otherwise not be possible.

We now make sure the socket permissions are set up prior to calling
listen(2).

(cherry picked from commit a11b3bc34a054818f2ac70e50adfc542ca1cba42)
Yossi Gottlieb <yossigo@gmail.com> no 2023-10-11
0001-fix-ftbfs-on-kfreebsd.patch fix-ftbfs-on-kfreebsd Chris Lamb <lamby@debian.org> no 2015-10-30
debian-packaging/0003-dpkg-buildflags.patch Add CPPFLAGS in upstream makefiles Chris Lamb <lamby@debian.org> no 2015-10-30
debian-packaging/0007-Set-Debian-configuration-defaults.patch Set Debian configuration defaults. Chris Lamb <lamby@debian.org> not-needed 2017-10-10
0010-Use-get_current_dir_name-over-PATHMAX-etc.patch Use get_current_dir_name over PATHMAX, etc. Chris Lamb <lamby@debian.org> no 2018-01-24
0010-Add-support-for-USE_SYSTEM_JEMALLOC-flag.patch Add support for USE_SYSTEM_JEMALLOC flag.
https://github.com/antirez/redis/pull/5279
Chris Lamb <lamby@debian.org> no 2018-08-25
0011-Add-support-for-a-USE_SYSTEM_LUA-flag.patch Add support for a USE_SYSTEM_LUA flag.

https://github.com/antirez/redis/pull/5280
Chris Lamb <lamby@debian.org> invalid 2018-08-26
0007-Add-support-for-a-USE_SYSTEM_HIREDIS-flag.patch Add support for a USE_SYSTEM_HIREDIS flag. Chris Lamb <lamby@debian.org> no 2018-10-03
debian-packaging/0008-Ensure-we-use-the-modules-for-third-party-libraries.patch Ensure we use the modules for third-party libraries. Chris Lamb <lamby@debian.org> not-needed 2018-11-08
0009-Send-the-readiness-notification-when-we-are-ready-to.patch Send the readiness notification when we are ready to accept connections

On a replica we do accept connections, even though commands accessing
the database will operate in read-only mode. But the server is still
already operational and processing commands.

Not sending the readiness notification means that on a HA setup where
the nodes all start as replicas (with replicaof in the config) with
a replica that cannot connect to the master server and which might not
come back in a predictable amount of time or at all, the service
supervisor will end up timing out the service and terminating it, with
no option to promote it to be the main instance. This seems counter to
what the readiness notification is supposed to be signaling.

Instead send the readiness notification when we start accepting
commands, and then send the various server status changes as that.
Guillem Jover <gjover@sipwise.com> no 2021-01-19

All known versions for source package 'redis'

Links