Summary: | <dev-db/redis-3.2.5: Redis CONFIG SET client-output-buffer-limit Code Execution Vulnerability (CVE-2016-8339) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Thomas Deutschmann (RETIRED) <whissi> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | bugs, proxy-maint, robbat2, ultrabug |
Priority: | Normal | Flags: | kensington:
sanity-check+
|
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.talosintelligence.com/reports/TALOS-2016-0206/ | ||
Whiteboard: | B1 [glsa cve] | ||
Package list: |
=dev-db/redis-3.2.5
|
Runtime testing required: | --- |
Bug Depends on: | 589044 | ||
Bug Blocks: | 585646, 593134 |
Description
Thomas Deutschmann (RETIRED)
![]() From upstream changelog (https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES): ================================================================================ Redis 3.2.4 Released Mon Sep 26 08:58:21 CEST 2016 ================================================================================ Upgrade urgency CRITICAL: Redis 3.2 and unstable contained a security vulnerability fixed by this release. Hello Redis Wizards of the Memory Stores Empire, this is a Redis critical release in order to fix a security issue which is documented clearly here: https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977 Thanks to Cory Duplantis of Cisco Talos for reporting the issue. IMPACT: The gist is that using CONFIG SET calls (or by manipulating redis.conf) an attacker is able to compromise certain fields of the "server" global structure, including the aof filename pointer, that could be made pointing to something else. In turn the AOF name is used in different contexts such as logging, rename(2) and open(2) syscalls, leading to potential problems. Please note that since having access to CONFIG SET also means to be able to change the AOF filename (and many other things) directly, this issue actual real world impact is quite small, so I would not panik: if you have CONFIG SET level of access, you can do more and more easily. AFFECTED VERSIONS: All Redis 3.2.x versions are affected. [...] CVE-2016-8339 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8339): A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution. @ Arches, please test and mark stable: =dev-db/redis-3.2.5 Stable target(s): amd64 hppa ppc64 x86 amd64 stable x86 stable ppc64 stable Stable for HPPA. New GLSA request filed. 3.2.x branch is clean. This issue was resolved and addressed in GLSA 201702-16 at https://security.gentoo.org/glsa/201702-16 by GLSA coordinator Thomas Deutschmann (whissi). |