1. 26 6月, 2018 2 次提交
  2. 18 6月, 2018 9 次提交
  3. 17 6月, 2018 1 次提交
  4. 16 6月, 2018 2 次提交
  5. 15 6月, 2018 3 次提交
  6. 14 6月, 2018 5 次提交
  7. 13 6月, 2018 9 次提交
    • S
      Fix config_set_numerical_field() integer overflow. · e4e5a670
      shenlongxing 提交于
      e4e5a670
    • Z
      optimize reply list memory usage · 963002d7
      zhaozhao.zz 提交于
      963002d7
    • A
      Security: fix redis-cli buffer overflow. · ce17f76b
      antirez 提交于
      Thanks to Fakhri Zulkifli for reporting it.
      
      The fix switched to dynamic allocation, copying the final prompt in the
      static buffer only at the end.
      ce17f76b
    • A
      Security: fix Lua struct package offset handling. · e89086e0
      antirez 提交于
      After the first fix to the struct package I found another similar
      problem, which is fixed by this patch. It could be reproduced easily by
      running the following script:
      
          return struct.unpack('f', "xxxxxxxxxxxxx",-3)
      
      The above will access bytes before the 'data' pointer.
      e89086e0
    • A
      Security: more cmsgpack fixes by @soloestoy. · 5ccb6f7a
      antirez 提交于
      @soloestoy sent me this additional fixes, after searching for similar
      problems to the one reported in mp_pack(). I'm committing the changes
      because it was not possible during to make a public PR to protect Redis
      users and give Redis providers some time to patch their systems.
      5ccb6f7a
    • A
      Security: update Lua struct package for security. · 1eb08bcd
      antirez 提交于
      During an auditing Apple found that the "struct" Lua package
      we ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains
      a security problem. A bound-checking statement fails because of integer
      overflow. The bug exists since we initially integrated this package with
      Lua, when scripting was introduced, so every version of Redis with
      EVAL/EVALSHA capabilities exposed is affected.
      
      Instead of just fixing the bug, the library was updated to the latest
      version shipped by the author.
      1eb08bcd
    • A
      Security: fix Lua cmsgpack library stack overflow. · 52a00201
      antirez 提交于
      During an auditing effort, the Apple Vulnerability Research team discovered
      a critical Redis security issue affecting the Lua scripting part of Redis.
      
      -- Description of the problem
      
      Several years ago I merged a pull request including many small changes at
      the Lua MsgPack library (that originally I authored myself). The Pull
      Request entered Redis in commit 90b6337c, in 2014.
      Unfortunately one of the changes included a variadic Lua function that
      lacked the check for the available Lua C stack. As a result, calling the
      "pack" MsgPack library function with a large number of arguments, results
      into pushing into the Lua C stack a number of new values proportional to
      the number of arguments the function was called with. The pushed values,
      moreover, are controlled by untrusted user input.
      
      This in turn causes stack smashing which we believe to be exploitable,
      while not very deterministic, but it is likely that an exploit could be
      created targeting specific versions of Redis executables. However at its
      minimum the issue results in a DoS, crashing the Redis server.
      
      -- Versions affected
      
      Versions greater or equal to Redis 2.8.18 are affected.
      
      -- Reproducing
      
      Reproduce with this (based on the original reproduction script by
      Apple security team):
      
      https://gist.github.com/antirez/82445fcbea6d9b19f97014cc6cc79f8a
      
      -- Verification of the fix
      
      The fix was tested in the following way:
      
      1) I checked that the problem is no longer observable running the trigger.
      2) The Lua code was analyzed to understand the stack semantics, and that
      actually enough stack is allocated in all the cases of mp_pack() calls.
      3) The mp_pack() function was modified in order to show exactly what items
      in the stack were being set, to make sure that there is no silent overflow
      even after the fix.
      
      -- Credits
      
      Thank you to the Apple team and to the other persons that helped me
      checking the patch and coordinating this communication.
      52a00201
    • A
      RDB: Apply fix to rdbLoadMillisecondTime() only for new RDB versions. · 032ea657
      antirez 提交于
      This way we let big endian systems to still load old RDB versions.
      However newver versions will be saved and loaded in a way that make RDB
      expires cross-endian again. Thanks to @oranagra for the reporting and
      the discussion about this problem, leading to this fix.
      032ea657
    • A
      Streams: generate a few additional events. · 6b8a24a6
      antirez 提交于
      Currently it does not look it's sensible to generate events for streams
      consumer groups modification, being them metadata, however at least for
      key-level events, like the creation or removal of a consumer group, I
      added a few events here and there. Later we can evaluate if it makes
      sense to add more. From the POV instead of WAIT (in Redis transaciton)
      and signaling the key as modified, it looks like that the transaction
      should not fail when a stream is modified, so no calls are made in
      consumer groups related functions to signalModifiedKey().
      6b8a24a6
  8. 12 6月, 2018 9 次提交