Bug 1727721

Summary: CVE-2019-10193 redis: Stack buffer overflow in HyperLogLog triggered by malicious client [openstack-rdo]
Product: [Community] RDO Reporter: Summer Long <slong>
Component: distributionAssignee: Alfredo Moralejo <amoralej>
Status: CLOSED CURRENTRELEASE QA Contact: Shai Revivo <srevivo>
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: dbecker, jjoyce, jschluet, lhh, lpeer, markmc, mburns, sclewis, slinaber, srevivo, ykarel
Target Milestone: ---Keywords: Security, SecurityTracking
Target Release: trunk   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: component:redis
Fixed In Version: Doc Type: No Doc Update
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-08-24 12:57:36 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 1727668    

Description Summer Long 2019-07-08 04:26:29 UTC
This is an automatically created tracking bug!  It was created to ensure
that one or more security vulnerabilities are fixed in affected versions
of openstack-rdo.

For comments that are specific to the vulnerability please use bugs filed
against the "Security Response" product referenced in the "Blocks" field.

For more information see:

When submitting as an update, use the fedpkg template provided in the next
comment(s).  This will include the bug IDs of this tracking bug as well as
the relevant top-level CVE bugs.

Please also mention the CVE IDs being fixed in the RPM changelog and the
fedpkg commit message.

Comment 1 Alfredo Moralejo 2020-07-28 14:15:18 UTC
Updating to 3.2.13 for CentOS7 https://review.rdoproject.org/r/28753

For CentOS 8 we use redis from CentOS AppStream

Comment 2 Yatin Karel 2020-08-24 12:57:36 UTC
3.2.13 is included in centos7 repos. For CentOS8 based releases we consume from CentOS8 Appstream repo.