Bug 1727668 (CVE-2019-10193) - CVE-2019-10193 redis: Stack buffer overflow in HyperLogLog triggered by malicious client
Summary: CVE-2019-10193 redis: Stack buffer overflow in HyperLogLog triggered by malic...
Status: NEW
Alias: CVE-2019-10193
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20190619,repo...
Keywords: Security
Depends On: 1727715 1727716 1727717 1727718 1727719 1727721 1728470 1728471 1728916 1728917
Blocks: 1727663
TreeView+ depends on / blocked
 
Reported: 2019-07-08 00:12 UTC by Summer Long
Modified: 2019-07-11 13:42 UTC (History)
26 users (show)

(edit)
A stack buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By corrupting a HyperLogLog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Clone Of:
(edit)
Last Closed:


Attachments (Terms of Use)

Description Summer Long 2019-07-08 00:12:57 UTC
Stack buffer overflow due to failure to validate register values in hllDenseRegHisto(). By corrupting a hyperloglog structure in Redis using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

Comment 5 Summer Long 2019-07-08 04:26:34 UTC
Created redis tracking bugs for this issue:

Affects: openstack-rdo [bug 1727721]

Comment 7 Summer Long 2019-07-10 00:20:33 UTC
Upstream timeline: https://github.com/antirez/redis/issues/6215

Comment 11 Hardik Vyas 2019-07-11 13:42:04 UTC
Statement:

* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.
* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.


Note You need to log in before you can comment on or make changes to this bug.