Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2019:2002

Опубликовано: 07 авг. 2019
Источник: rocky
Оценка: Important

Описание

Important: redis:5 security update

Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.

Security Fix(es):

  • redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)

  • redis: Stack buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10193)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
redisx86_642.module+el8.4.0+393+5af13779redis-5.0.3-2.module+el8.4.0+393+5af13779.x86_64.rpm
redis-develx86_642.module+el8.4.0+393+5af13779redis-devel-5.0.3-2.module+el8.4.0+393+5af13779.x86_64.rpm
redis-docnoarch2.module+el8.4.0+393+5af13779redis-doc-5.0.3-2.module+el8.4.0+393+5af13779.noarch.rpm
redis-docnoarch2.module+el8.4.0+393+5af13779redis-doc-5.0.3-2.module+el8.4.0+393+5af13779.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
больше 6 лет назад

ELSA-2019-2002: redis:5 security update (IMPORTANT)

CVSS3: 7.2
ubuntu
больше 6 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

CVSS3: 7.2
redhat
больше 6 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

CVSS3: 7.2
nvd
больше 6 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

CVSS3: 7.2
debian
больше 6 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperlogl ...