First published: Mon Jul 08 2019(Updated: )
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/Redis | <3.2.13 | 3.2.13 |
redhat/Redis | <4.0.14 | 4.0.14 |
redhat/Redis | <5.0.4 | 5.0.4 |
debian/redis | 5:6.0.16-1+deb11u2 5:6.0.16-1+deb11u3 5:7.0.15-1~deb12u1 5:7.0.15-1 | |
Redis Labs Redis | >=3.0.0<3.2.13 | |
Redis Labs Redis | >=4.0.0<4.0.14 | |
Redis Labs Redis | >=5.0<5.0.4 | |
redhat openstack | =9 | |
redhat openstack | =10 | |
redhat openstack | =13 | |
redhat openstack | =14 | |
Red Hat Enterprise Linux | =8.0 | |
redhat enterprise Linux eus | =8.1 | |
redhat enterprise Linux eus | =8.2 | |
redhat enterprise Linux eus | =8.4 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server aus | =8.4 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server tus | =8.4 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
Oracle Communications Operations Monitor | =3.4 | |
Oracle Communications Operations Monitor | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-10193.
The severity of CVE-2019-10193 is high.
Versions 3.x before 3.2.13, 4.x before 4.0.14, and 5.x before 5.0.4 are affected by CVE-2019-10193.
An attacker can exploit CVE-2019-10193 by corrupting a hyperloglog using the SETRANGE command.
You can find more information about CVE-2019-10193 on the following references: [Bugzilla Red Hat](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10193), [Redis 3.2 Release Notes](https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES), [Redis 4.0 Release Notes](https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES).