Divya Chellam 42df84dcf3 redis: fix CVE-2024-31228
Redis is an open source, in-memory database that persists on disk.
Authenticated users can trigger a denial-of-service by using specially
crafted, long string match patterns on supported commands such as
`KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL
definitions. Matching of extremely long patterns may result in
unbounded recursion, leading to stack overflow and process crash.
This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1.
Users are advised to upgrade. There are no known workarounds for this
vulnerability.

References:
https://security-tracker.debian.org/tracker/CVE-2024-31228

Upstream-patch:
9317bf6465

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-02-09 07:55:14 -08:00
2024-12-31 09:04:11 -05:00
2025-02-09 07:55:14 -08:00
2019-06-15 16:45:33 -07:00

Collection of layers for the OE-core universe

Main layer maintainer: Armin Kuster <akuster808@gmail.com>

This repository is a collection of layers to suppliment OE-Core
with additional packages, Each layer have designated maintainer
Please see the respective READMEs in the layer subdirectories
Description
Collection of OpenEmbedded layers
https://openembedded.org/
Readme 94 MiB
Languages
BitBake 84.9%
Shell 6.3%
C 3%
Roff 2.2%
NASL 1.9%
Other 1.5%