Description
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4480-1 | redis security update |
Ubuntu USN |
USN-4061-1 | Redis vulnerabilities |
References
History
No history.
Subscriptions
Canonical
Subscribe
Ubuntu Linux
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Oracle
Subscribe
Communications Operations Monitor
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Openstack
Subscribe
Rhel Software Collections
Subscribe
Redislabs
Subscribe
Redis
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T22:17:18.421Z
Reserved: 2019-03-27T00:00:00.000Z
Link: CVE-2019-10193
No data.
Status : Modified
Published: 2019-07-11T19:15:12.720
Modified: 2024-11-21T04:18:37.533
Link: CVE-2019-10193
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN