Bug 2376858 (CVE-2025-32023)

Summary: CVE-2025-32023 redis: Redis Hyperloglog Out-of-Bounds Write Vulnerability
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abarbaro, alinfoot, anthomas, aprice, bbrownin, bdettelb, brasmith, caswilli, cdaley, cochase, dnakabaa, doconnor, dranck, dtrifiro, ehelms, ggainey, haoli, hkataria, jajackso, jcammara, jcantril, jchui, jdobes, jhe, jkoehler, jmitchel, jneedle, jsamir, juwatts, jvasik, jwong, kaycoth, kegrant, kgaikwad, kholdawa, koliveir, kshier, ktsao, lcouzens, lphiri, mabashia, mhulan, mskarbek, nboldt, nmoumoul, oezr, orabin, osousa, pbraun, pcreech, periklis, psrna, rblanco, rbryant, rchan, rojacob, shvarugh, simaishi, smallamp, smcdonal, stcannon, teagle, tfister, thavo, tmalecek, ttakamiy, vmugicag, weaton, xiaoxwan, yguenane, zzhou
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Redis. This flaw allows an authenticated user to trigger an integer overflow by sending a specially crafted string, resulting in a stack or heap out-of-bounds write during hyperloglog operations. This issue potentially results in remote code execution.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2380117, 2380118    
Bug Blocks:    

Description OSIDB Bzimport 2025-07-07 16:01:46 UTC
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

Comment 2 errata-xmlrpc 2025-07-21 01:21:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:11401 https://access.redhat.com/errata/RHSA-2025:11401

Comment 3 errata-xmlrpc 2025-07-21 12:32:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:11453 https://access.redhat.com/errata/RHSA-2025:11453

Comment 5 errata-xmlrpc 2025-07-28 19:37:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:12006 https://access.redhat.com/errata/RHSA-2025:12006

Comment 6 errata-xmlrpc 2025-07-28 19:54:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:12008 https://access.redhat.com/errata/RHSA-2025:12008

Comment 7 errata-xmlrpc 2025-07-31 18:04:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:12468 https://access.redhat.com/errata/RHSA-2025:12468

Comment 8 errata-xmlrpc 2025-08-01 05:52:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:12478 https://access.redhat.com/errata/RHSA-2025:12478

Comment 9 errata-xmlrpc 2025-08-04 01:58:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:12524 https://access.redhat.com/errata/RHSA-2025:12524

Comment 10 errata-xmlrpc 2025-08-04 18:06:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:12768 https://access.redhat.com/errata/RHSA-2025:12768

Comment 11 errata-xmlrpc 2025-08-04 18:06:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:12769 https://access.redhat.com/errata/RHSA-2025:12769

Comment 12 errata-xmlrpc 2025-08-04 18:45:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:12789 https://access.redhat.com/errata/RHSA-2025:12789

Comment 13 errata-xmlrpc 2025-08-05 06:30:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:12892 https://access.redhat.com/errata/RHSA-2025:12892