Memory Safety / Integer overflow in zrange/store path (negative length handling)
Description
Proof of Concept
Commit Details
Author: Yanqi Lv
Date: 2024-03-19 06:52 UTC
Message:
Triage Assessment
Vulnerability Type: Memory Safety / Overflow
Confidence: MEDIUM
Reasoning:
The change prevents a negative length from being passed into zsetTypeCreate, which would convert -1 to an unsigned very large value and potentially trigger a pathological memory/structure overflow during zrange/store handling. This improves memory safety and correctness in zrangestore-related paths, reducing risk of improper representation (e.g., skiplist vs listpack) due to overflow. While primarily a correctness fix, it mitigates a potential overflow/memory-safety issue that could be exploited in edge cases.
Verification Assessment
Vulnerability Type: Memory Safety / Integer overflow in zrange/store path (negative length handling)
Confidence: MEDIUM
Affected Versions: <= 8.6.2