Total vulnerabilities in the database
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Software | From | Fixed in |
---|---|---|
redislabs / redis | 5.0 | 5.0.4 |
redislabs / redis | 3.0.0 | 3.2.13 |
redislabs / redis | 4.0.0 | 4.0.14 |
redhat / openstack | 10 | 10.x |
redhat / openstack | 9 | 9.x |
redhat / enterprise_linux | 8.0 | 8.0.x |
redhat / enterprise_linux_eus | 8.1 | 8.1.x |
redhat / openstack | 14 | 14.x |
redhat / enterprise_linux_eus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_tus | 8.2 | 8.2.x |
redhat / enterprise_linux_server_aus | 8.2 | 8.2.x |
redhat / openstack | 13 | 13.x |
redhat / enterprise_linux_server_tus | 8.4 | 8.4.x |
redhat / enterprise_linux_eus | 8.4 | 8.4.x |
redhat / enterprise_linux_server_aus | 8.4 | 8.4.x |
debian / debian_linux | 9.0 | 9.0.x |
debian / debian_linux | 10.0 | 10.0.x |
canonical / ubuntu_linux | 16.04 | 16.04.x |
canonical / ubuntu_linux | 18.04 | 18.04.x |
canonical / ubuntu_linux | 19.04 | 19.04.x |
oracle / communications_operations_monitor | 3.4 | 3.4.x |
oracle / communications_operations_monitor | 4.1 | 4.1.x |