Description
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1850-1 | redis security update |
Debian DSA |
DSA-4480-1 | redis security update |
Ubuntu USN |
USN-4061-1 | Redis vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Oracle
Subscribe
Communications Operations Monitor
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Openstack
Subscribe
Openstack-optools
Subscribe
Rhel Software Collections
Subscribe
Software Collections
Subscribe
Redislabs
Subscribe
Redis
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T22:17:18.947Z
Reserved: 2019-03-27T00:00:00.000Z
Link: CVE-2019-10192
No data.
Status : Modified
Published: 2019-07-11T19:15:12.627
Modified: 2024-11-21T04:18:37.363
Link: CVE-2019-10192
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN