** Description changed:

+ [Impact]
+ 
+ Various bugs exist in the current Ubuntu version of Valkey in Noble and
+ Oracular, including 3 CVEs. They are
+ 
+ (CVE-2024-31449) Lua library commands may lead to stack overflow and 
potential RCE.
+ (CVE-2024-31227) Potential Denial-of-service due to malformed ACL selectors.
+ (CVE-2024-31228) Potential Denial-of-service due to unbounded pattern 
matching.
+ 
+ The other bugs listed upstream are:
+ 
+ https://github.com/valkey-io/valkey/pull/1001
+ https://github.com/valkey-io/valkey/pull/965
+ https://github.com/valkey-io/valkey/pull/608
+ https://github.com/valkey-io/valkey/pull/526
+ https://github.com/valkey-io/valkey/issues/784
+ https://github.com/valkey-io/valkey/issues/619
+ https://github.com/valkey-io/valkey/pull/634
+ https://github.com/valkey-io/valkey/pull/461
+ https://github.com/valkey-io/valkey/issues/719
+ 
+ These fixes should be added to the stable release to avoid known
+ security vulnerabilities.
+ 
+ Ideally, these fixes should be added by updating to 7.2.7, the latest
+ stable release of 7.x. Upstream takes care to avoid backwards
+ incompatible changes in this stable release set and matching their
+ version would best match user expectations.
+ 
+ [Test Plan]
+ 
+ Initial testing should include making sure dep-8 tests all pass. This
+ package includes a large suite of tests that check various runtime
+ configurations and redis compatibility.
+ 
+ The fix for CVE-2024-31449 can also be tested with:
+ 
+ $ sudo apt install valkey-server lua5.4
+ $ valkey-cli eval "return bit.tohex(65535, -2147483648)" 0
+ 
+ Before the fix, the following prints:
+ Error: Server closed the connection
+ 
+ After, it returns:
+ "0000FFFF"
+ 
+ [Where problems could occur]
+ 
+ As this is a full version backport, backwards-incompatible changes may
+ arise from the various changes included. I have mitigated this by
+ checking each individual commit and have noted any minor updates in the
+ changelog entry.
+ 
+ [Other Info]
+  
+ Oracular and Noble will differ from Plucky as they will remain on the 7.2.x 
version track while plucky is on 8.x.
+ 
+ [Original Description]
+ 
  Valkey should be updated from 7.2.5 to 7.2.7 in noble to fix the
  following security issues and other bugs:
- 
  
  (CVE-2024-31449) Lua library commands may lead to stack overflow and 
potential RCE.
  (CVE-2024-31227) Potential Denial-of-service due to malformed ACL selectors.
  (CVE-2024-31228) Potential Denial-of-service due to unbounded pattern 
matching.
  
  https://github.com/valkey-io/valkey/pull/1001
  https://github.com/valkey-io/valkey/pull/965
  https://github.com/valkey-io/valkey/pull/608
  https://github.com/valkey-io/valkey/pull/526
  https://github.com/valkey-io/valkey/issues/784
  https://github.com/valkey-io/valkey/issues/619
  https://github.com/valkey-io/valkey/pull/634
  https://github.com/valkey-io/valkey/pull/461
  https://github.com/valkey-io/valkey/issues/719

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2091129

Title:
  Update Valkey to 7.2.7 in noble and oracular

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/valkey/+bug/2091129/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to