Divya Chellam d9340d705d redis: fix CVE-2024-46981
Redis is an open source, in-memory database that persists on disk.
An authenticated user may use a specially crafted Lua script to
manipulate the garbage collector and potentially lead to remote
code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17.
An additional workaround to mitigate the problem without patching
the redis-server executable is to prevent users from executing Lua
scripts. This can be done using ACL to restrict EVAL and EVALSHA
commands.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2024-46981

Upstream-patch:
e344b2b587

Signed-off-by: Divya Chellam <divya.chellam@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
2025-02-09 07:55:20 -08:00
2024-12-31 09:04:11 -05:00
2025-02-09 07:55:20 -08:00
2019-06-15 16:45:33 -07:00

Collection of layers for the OE-core universe

Main layer maintainer: Armin Kuster <akuster808@gmail.com>

This repository is a collection of layers to suppliment OE-Core
with additional packages, Each layer have designated maintainer
Please see the respective READMEs in the layer subdirectories
Description
Collection of OpenEmbedded layers
https://openembedded.org/
Readme 94 MiB
Languages
BitBake 84.9%
Shell 6.3%
C 3%
Roff 2.2%
NASL 1.9%
Other 1.5%