Описание
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.
Отчет
- This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.
- This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Ceph Storage 3 | grafana | Not affected | ||
| Red Hat Storage 3 | grafana | Not affected | ||
| Red Hat Storage 3 | heketi | Not affected | ||
| Red Hat Enterprise Linux 8 | redis | Fixed | RHSA-2019:2002 | 07.08.2019 |
| Red Hat OpenStack Platform 10.0 (Newton) | redis | Fixed | RHSA-2019:2630 | 04.09.2019 |
| Red Hat OpenStack Platform 13.0 (Queens) | redis | Fixed | RHSA-2019:2628 | 04.09.2019 |
| Red Hat OpenStack Platform 14.0 (Rocky) | redis | Fixed | RHSA-2019:2621 | 04.09.2019 |
| Red Hat OpenStack Platform 9.0 (Mitaka) | redis | Fixed | RHSA-2019:2508 | 15.08.2019 |
| Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7 | redis | Fixed | RHSA-2019:2506 | 15.08.2019 |
| Red Hat Software Collections for Red Hat Enterprise Linux 6 | rh-redis32-redis | Fixed | RHSA-2019:1860 | 25.07.2019 |
Показывать по
Ссылки на источники
Дополнительная информация
Статус:
EPSS
7.2 High
CVSS3
Связанные уязвимости
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
A heap-buffer overflow vulnerability was found in the Redis hyperloglo ...
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
Уязвимость алгоритма HyperLogLog резидентной системы управления базами данных класса NoSQL Redis, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
EPSS
7.2 High
CVSS3