diff options
| author | Gyorgy Sarvari <skandigraun@gmail.com> | 2026-02-05 07:59:55 +0100 |
|---|---|---|
| committer | Anuj Mittal <anuj.mittal@oss.qualcomm.com> | 2026-02-19 08:20:28 +0530 |
| commit | 80a54658337f50fb8db82d59693eb386e359423a (patch) | |
| tree | b9fe5745086aeb75a801f958fb1c7a0d1e110006 | |
| parent | effd66ea21bc2c7bbedc0c87ac35f6ab9ce6de81 (diff) | |
| download | meta-openembedded-80a54658337f50fb8db82d59693eb386e359423a.tar.gz | |
redis: ignore CVE-2025-46686
Details: https://nvd.nist.gov/vuln/detail/CVE-2025-46686
Upstream disputes that it is a security violation, and says that
implementing a mitigation for this would negatively affect the rest
of the application, so they elected to ignore it.
See Github advisory about the same vulnerability:
https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 868b4b2959c1f6be13693e31eae5b27a1fa697e6)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Anuj Mittal <anuj.mittal@oss.qualcomm.com>
| -rw-r--r-- | meta-oe/recipes-extended/redis/redis_6.2.21.bb | 1 | ||||
| -rw-r--r-- | meta-oe/recipes-extended/redis/redis_7.2.12.bb | 1 |
2 files changed, 2 insertions, 0 deletions
diff --git a/meta-oe/recipes-extended/redis/redis_6.2.21.bb b/meta-oe/recipes-extended/redis/redis_6.2.21.bb index 6166769ffa..69f7a73f5d 100644 --- a/meta-oe/recipes-extended/redis/redis_6.2.21.bb +++ b/meta-oe/recipes-extended/redis/redis_6.2.21.bb | |||
| @@ -23,6 +23,7 @@ SRC_URI[sha256sum] = "6383b32ba8d246f41bbbb83663381f5a5f4c4713235433cec22fc4a47e | |||
| 23 | CVE_STATUS[CVE-2025-21605] = "cpe-incorrect: the used version already contains the fix" | 23 | CVE_STATUS[CVE-2025-21605] = "cpe-incorrect: the used version already contains the fix" |
| 24 | CVE_STATUS[CVE-2022-0543] = "not-applicable-config: the vulnerability is not present in upstream, only in Debian-packaged version" | 24 | CVE_STATUS[CVE-2022-0543] = "not-applicable-config: the vulnerability is not present in upstream, only in Debian-packaged version" |
| 25 | CVE_STATUS[CVE-2022-3734] = "not-applicable-config: only affects Windows" | 25 | CVE_STATUS[CVE-2022-3734] = "not-applicable-config: only affects Windows" |
| 26 | CVE_STATUS[CVE-2025-46686] = "disputed: upstream rejected because mitigating it would affect other functionality" | ||
| 26 | 27 | ||
| 27 | inherit update-rc.d systemd useradd | 28 | inherit update-rc.d systemd useradd |
| 28 | 29 | ||
diff --git a/meta-oe/recipes-extended/redis/redis_7.2.12.bb b/meta-oe/recipes-extended/redis/redis_7.2.12.bb index 6527fb6996..997c962a96 100644 --- a/meta-oe/recipes-extended/redis/redis_7.2.12.bb +++ b/meta-oe/recipes-extended/redis/redis_7.2.12.bb | |||
| @@ -23,6 +23,7 @@ RPROVIDES:${PN} = "virtual-redis" | |||
| 23 | 23 | ||
| 24 | CVE_STATUS[CVE-2025-21605] = "cpe-incorrect: the used version already contains the fix" | 24 | CVE_STATUS[CVE-2025-21605] = "cpe-incorrect: the used version already contains the fix" |
| 25 | CVE_STATUS[CVE-2025-27151] = "cpe-incorrect: the used version already contains the fix" | 25 | CVE_STATUS[CVE-2025-27151] = "cpe-incorrect: the used version already contains the fix" |
| 26 | CVE_STATUS[CVE-2025-46686] = "disputed: upstream rejected because mitigating it would affect other functionality" | ||
| 26 | CVE_STATUS[CVE-2025-46817] = "cpe-incorrect: the used version already contains the fix" | 27 | CVE_STATUS[CVE-2025-46817] = "cpe-incorrect: the used version already contains the fix" |
| 27 | CVE_STATUS[CVE-2025-46818] = "cpe-incorrect: the used version already contains the fix" | 28 | CVE_STATUS[CVE-2025-46818] = "cpe-incorrect: the used version already contains the fix" |
| 28 | CVE_STATUS[CVE-2025-46819] = "cpe-incorrect: the used version already contains the fix" | 29 | CVE_STATUS[CVE-2025-46819] = "cpe-incorrect: the used version already contains the fix" |
