Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GEODE-9676: Limit array and string sizes for unauthenticated Radish connections #6994

Conversation

jdeppe-pivotal
Copy link
Contributor

@jdeppe-pivotal jdeppe-pivotal commented Oct 13, 2021

  • This applies the same fix as introduced by CVE-2021-32675 for Redis.
    When security is enabled, unauthenticated requests limit the size of
    arrays and bulk strings to 10 and 16384 respectively. Once connections
    are authenticated, the size restriction is not applied.
  • Re-enable the relevant Redis TCL test.

For all changes:

  • Is there a JIRA ticket associated with this PR? Is it referenced in the commit message?

  • Has your PR been rebased against the latest commit within the target branch (typically develop)?

  • Is your initial contribution a single, squashed commit?

  • Does gradlew build run cleanly?

  • Have you written or updated unit tests to verify your changes?

  • If adding new dependencies to the code, are these dependencies licensed in a way that is compatible for inclusion under ASF 2.0?

@jdeppe-pivotal jdeppe-pivotal added the redis Issues related to the geode-for-redis module label Oct 13, 2021
@jdeppe-pivotal jdeppe-pivotal marked this pull request as ready for review October 13, 2021 23:02
Copy link
Contributor

@DonalEvans DonalEvans left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, just a couple of small optional suggestions.

…onnections

- This applies the same fix as introduced by CVE-2021-32675 for Redis.
  Unuathenticated requests limit the size of arrays and bulk strings to
  10 and 16384 respectively. Once connections are authenticated, the
  size restriction is not applied.
- Re-enable the relevant Redis TCL test.
@jdeppe-pivotal jdeppe-pivotal force-pushed the feature/GEODE-9676-unauthd-multibulk branch from e403c0f to 36fac97 Compare October 18, 2021 18:58
Copy link
Contributor

@upthewaterspout upthewaterspout left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good!

@@ -45,12 +50,27 @@
*/
public class ByteToCommandDecoder extends ByteToMessageDecoder {

public static final String UNAUTHENTICATED_MAX_ARRAY_SIZE_PARAM =
"gemfire.geode-for-redis-unauthenticated-max-array-size";
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I wonder if these properties should be prefixed geode. and not gemfire.?

@jdeppe-pivotal jdeppe-pivotal merged commit 4398bec into apache:develop Oct 19, 2021
demery-pivotal pushed a commit to demery-pivotal/geode that referenced this pull request Oct 19, 2021
…onnections (apache#6994)

- This applies the same fix as introduced by CVE-2021-32675 for Redis.
  When security is enabled, unuauthenticated requests limit the size of arrays
  and bulk strings to 10 and 16384 respectively. Once connections are authenticated,
  the size restriction is not applied.
- When security is not enabled, this restriction does not apply.
- Re-enable the relevant Redis TCL test.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
redis Issues related to the geode-for-redis module
Projects
None yet
5 participants