Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-10192 (GCVE-0-2019-10192)
Vulnerability from cvelistv5 – Published: 2019-07-11 18:30 – Updated: 2024-08-04 22:17| Vendor | Product | Version | ||
|---|---|---|---|---|
| Redis Labs | redis |
Affected:
3.x before 3.2.13
Affected: 4.x before 4.0.14 Affected: 5.x before 5.0.4 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T22:17:18.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-4480",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"name": "20190712 [SECURITY] [DSA 4480-1] redis security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"name": "USN-4061-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4061-1/"
},
{
"name": "109290",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/109290"
},
{
"name": "RHSA-2019:1819",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"name": "RHSA-2019:1860",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"name": "RHSA-2019:2002",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"name": "GLSA-201908-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"name": "RHSA-2019:2508",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"name": "RHSA-2019:2506",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"name": "RHSA-2019:2621",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"name": "RHSA-2019:2630",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "redis",
"vendor": "Redis Labs",
"versions": [
{
"status": "affected",
"version": "3.x before 3.2.13"
},
{
"status": "affected",
"version": "4.x before 4.0.14"
},
{
"status": "affected",
"version": "5.x before 5.0.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-07-15T02:23:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "DSA-4480",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"name": "20190712 [SECURITY] [DSA 4480-1] redis security update",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"name": "USN-4061-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4061-1/"
},
{
"name": "109290",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/109290"
},
{
"name": "RHSA-2019:1819",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"name": "RHSA-2019:1860",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"name": "RHSA-2019:2002",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"name": "GLSA-201908-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"name": "RHSA-2019:2508",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"name": "RHSA-2019:2506",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"name": "RHSA-2019:2621",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"name": "RHSA-2019:2630",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-10192",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "redis",
"version": {
"version_data": [
{
"version_value": "3.x before 3.2.13"
},
{
"version_value": "4.x before 4.0.14"
},
{
"version_value": "5.x before 5.0.4"
}
]
}
}
]
},
"vendor_name": "Redis Labs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4480",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"name": "20190712 [SECURITY] [DSA 4480-1] redis security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"name": "USN-4061-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4061-1/"
},
{
"name": "109290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/109290"
},
{
"name": "RHSA-2019:1819",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"name": "RHSA-2019:1860",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"name": "RHSA-2019:2002",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"name": "GLSA-201908-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"name": "RHSA-2019:2508",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"name": "RHSA-2019:2506",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"name": "RHSA-2019:2621",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"name": "RHSA-2019:2630",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2019-10192",
"datePublished": "2019-07-11T18:30:33.000Z",
"dateReserved": "2019-03-27T00:00:00.000Z",
"dateUpdated": "2024-08-04T22:17:18.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2019-10192\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-07-11T19:15:12.627\",\"lastModified\":\"2024-11-21T04:18:37.363\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer de la pila en hyperloglog data structure versiones 3.x anteriores a 3.2.13, versiones 4.x anteriores a 4.0.14 y versiones 5.x anteriores a 5.0.4 de Redis. Por la corrupci\u00f3n cuidadosa de un hyperloglog usando el comando SETRANGE, un atacante podr\u00eda enga\u00f1ar la interpretaci\u00f3n de Redis de codificaci\u00f3n HLL densa para escribir hasta 3 bytes m\u00e1s all\u00e1 del final de un b\u00fafer asignado a la pila.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:P/A:P\",\"baseScore\":6.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndExcluding\":\"3.2.13\",\"matchCriteriaId\":\"69CAD776-FA0E-499F-BA66-5C77DCC1B115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndExcluding\":\"4.0.14\",\"matchCriteriaId\":\"B901D22B-C584-4BEE-98C2-9B11B9FBD7A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0\",\"versionEndExcluding\":\"5.0.4\",\"matchCriteriaId\":\"4352C6A2-43E2-4DC7-BFD6-2A9E6A8B6EB9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40C26BE-56CB-4022-A1D8-3CA0A8F87F4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704CFA1A-953E-4105-BFBE-406034B83DED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB7F358B-5E56-41AB-BB8A-23D3CB7A248B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7EE4B6-A6EC-4B9B-91DF-79615796673F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3F09B5-569F-4C58-9FCA-3C0953D107B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28F226A-CBC7-4A32-BE58-398FA5B42481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09ACF2D-D83F-4A86-8185-9569605D8EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC10D919-57FD-4725-B8D2-39ECB476902F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD783B0C-9246-47D9-A937-6144FE8BFF0F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D52F557F-D0A0-43D3-85F1-F10B6EBFAEDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF30C76E-7E58-4D76-89A8-53405685DA86\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/109290\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1819\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1860\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2002\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2506\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2508\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2621\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2630\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/19\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-04\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4061-1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4480\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/109290\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1819\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1860\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2002\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2506\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2508\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2621\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2630\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Jul/19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201908-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/4061-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2019/dsa-4480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
GSD-2019-10192
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2019-10192",
"description": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.",
"id": "GSD-2019-10192",
"references": [
"https://www.suse.com/security/cve/CVE-2019-10192.html",
"https://www.debian.org/security/2019/dsa-4480",
"https://access.redhat.com/errata/RHSA-2019:2630",
"https://access.redhat.com/errata/RHSA-2019:2628",
"https://access.redhat.com/errata/RHSA-2019:2621",
"https://access.redhat.com/errata/RHSA-2019:2508",
"https://access.redhat.com/errata/RHSA-2019:2506",
"https://access.redhat.com/errata/RHSA-2019:2002",
"https://access.redhat.com/errata/RHSA-2019:1860",
"https://access.redhat.com/errata/RHSA-2019:1819",
"https://ubuntu.com/security/CVE-2019-10192",
"https://advisories.mageia.org/CVE-2019-10192.html",
"https://linux.oracle.com/cve/CVE-2019-10192.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-10192"
],
"details": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.",
"id": "GSD-2019-10192",
"modified": "2023-12-13T01:23:59.164365Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-10192",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "redis",
"version": {
"version_data": [
{
"version_value": "3.x before 3.2.13"
},
{
"version_value": "4.x before 4.0.14"
},
{
"version_value": "5.x before 5.0.4"
}
]
}
}
]
},
"vendor_name": "Redis Labs"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "7.2/CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4480",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"name": "20190712 [SECURITY] [DSA 4480-1] redis security update",
"refsource": "BUGTRAQ",
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"name": "USN-4061-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4061-1/"
},
{
"name": "109290",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/109290"
},
{
"name": "RHSA-2019:1819",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"name": "RHSA-2019:1860",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"name": "RHSA-2019:2002",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"name": "GLSA-201908-04",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"name": "RHSA-2019:2508",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"name": "RHSA-2019:2506",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"name": "RHSA-2019:2621",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"name": "RHSA-2019:2630",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"refsource": "MISC",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.0.14",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.2.13",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.0.4",
"versionStartIncluding": "5.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-10192"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"name": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"refsource": "MISC",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"name": "DSA-4480",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"name": "20190712 [SECURITY] [DSA 4480-1] redis security update",
"refsource": "BUGTRAQ",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"name": "USN-4061-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4061-1/"
},
{
"name": "109290",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/109290"
},
{
"name": "RHSA-2019:1819",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"name": "RHSA-2019:1860",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"name": "RHSA-2019:2002",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"name": "GLSA-201908-04",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"name": "RHSA-2019:2508",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"name": "RHSA-2019:2506",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"name": "RHSA-2019:2621",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"name": "RHSA-2019:2630",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2020.html",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-10-28T12:14Z",
"publishedDate": "2019-07-11T19:15Z"
}
}
}
GHSA-PGCV-CRQQ-F8X5
Vulnerability from github – Published: 2022-05-24 16:50 – Updated: 2022-05-24 16:50A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
{
"affected": [],
"aliases": [
"CVE-2019-10192"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-07-11T19:15:00Z",
"severity": "HIGH"
},
"details": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.",
"id": "GHSA-pgcv-crqq-f8x5",
"modified": "2022-05-24T16:50:03Z",
"published": "2022-05-24T16:50:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4061-1"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"type": "WEB",
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"type": "WEB",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"type": "WEB",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"type": "WEB",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/109290"
}
],
"schema_version": "1.4.0",
"severity": []
}
RHSA-2019:2002
Vulnerability from csaf_redhat - Published: 2019-08-07 10:53 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the redis:5 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\n* redis: Stack buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10193)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2002",
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "1727668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727668"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2002.json"
}
],
"title": "Red Hat Security Advisory: redis:5 security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:17+00:00",
"generator": {
"date": "2025-11-21T18:09:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2002",
"initial_release_date": "2019-08-07T10:53:11+00:00",
"revision_history": [
{
"date": "2019-08-07T10:53:11+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-07T10:53:11+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"product": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src (redis:5)",
"product_id": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=src\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5)",
"product_id": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=x86_64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5)",
"product_id": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=x86_64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5)",
"product_id": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debugsource@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=x86_64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5)",
"product_id": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-devel@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=x86_64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5",
"product": {
"name": "redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch (redis:5)",
"product_id": "redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-doc@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=noarch\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5)",
"product_id": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=s390x\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5)",
"product_id": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=s390x\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5)",
"product_id": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debugsource@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=s390x\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5)",
"product_id": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-devel@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=s390x\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5)",
"product_id": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=ppc64le\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5)",
"product_id": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=ppc64le\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5)",
"product_id": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debugsource@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=ppc64le\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5)",
"product_id": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-devel@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=ppc64le\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5)",
"product_id": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=aarch64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5)",
"product_id": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=aarch64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5)",
"product_id": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debugsource@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=aarch64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
},
{
"category": "product_version",
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5)",
"product_id": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-devel@5.0.3-2.module%2Bel8.0.0.z%2B3657%2Bacb471dc?arch=aarch64\u0026rpmmod=redis:5:8000020190711140130:f8e95b4e"
}
}
}
],
"category": "architecture",
"name": "aarch64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5"
},
"product_reference": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5"
},
"product_reference": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5"
},
"product_reference": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5"
},
"product_reference": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5"
},
"product_reference": "redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5"
},
"product_reference": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5"
},
"product_reference": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5"
},
"product_reference": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5"
},
"product_reference": "redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5"
},
"product_reference": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5"
},
"product_reference": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5"
},
"product_reference": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5"
},
"product_reference": "redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5"
},
"product_reference": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5"
},
"product_reference": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5"
},
"product_reference": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64 (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5"
},
"product_reference": "redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch (redis:5) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.0.0.Z:redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5"
},
"product_reference": "redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5",
"relates_to_product_reference": "AppStream-8.0.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-07T10:53:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
},
{
"cve": "CVE-2019-10193",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1727668"
}
],
"notes": [
{
"category": "description",
"text": "A stack buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By corrupting a HyperLogLog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Stack buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following product versions are not affected because they do not ship the vulnerable code:\n* Red Hat OpenStack Platform, all versions\n* Red Hat Ceph Storage 3, which only ships the client-side part of Redis in its packaged Grafana.\n* Red Hat Gluster Storage 3, which only ships the client-side part of Redis in its packaged Grafana and Heketi.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10193"
},
{
"category": "external",
"summary": "RHBZ#1727668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-07T10:53:11+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.src::redis:5",
"AppStream-8.0.0.Z:redis-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debuginfo-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-debugsource-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.aarch64::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.ppc64le::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.s390x::redis:5",
"AppStream-8.0.0.Z:redis-devel-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.x86_64::redis:5",
"AppStream-8.0.0.Z:redis-doc-0:5.0.3-2.module+el8.0.0.z+3657+acb471dc.noarch::redis:5"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Stack buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
RHSA-2019:1819
Vulnerability from csaf_redhat - Published: 2019-07-22 13:36 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-redis5-redis is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\n* redis: Stack buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10193)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1819",
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "1727668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727668"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1819.json"
}
],
"title": "Red Hat Security Advisory: rh-redis5-redis security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:06+00:00",
"generator": {
"date": "2025-11-21T18:09:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:1819",
"initial_release_date": "2019-07-22T13:36:12+00:00",
"revision_history": [
{
"date": "2019-07-22T13:36:12+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-07-22T13:36:12+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"product": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"product_id": "rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis@5.0.5-1.el7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"product": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"product_id": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis-debuginfo@5.0.5-1.el7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-redis5-redis-0:5.0.5-1.el7.src",
"product": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.src",
"product_id": "rh-redis5-redis-0:5.0.5-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis@5.0.5-1.el7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"product": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"product_id": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis@5.0.5-1.el7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"product": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"product_id": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis-debuginfo@5.0.5-1.el7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"product": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"product_id": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis@5.0.5-1.el7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"product": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"product_id": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis-debuginfo@5.0.5-1.el7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"product": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"product_id": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis@5.0.5-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"product": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"product_id": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis5-redis-debuginfo@5.0.5-1.el7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.src",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-Alt-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.src"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.src"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.src"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
},
"product_reference": "rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-22T13:36:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
},
{
"cve": "CVE-2019-10193",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1727668"
}
],
"notes": [
{
"category": "description",
"text": "A stack buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By corrupting a HyperLogLog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Stack buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The following product versions are not affected because they do not ship the vulnerable code:\n* Red Hat OpenStack Platform, all versions\n* Red Hat Ceph Storage 3, which only ships the client-side part of Redis in its packaged Grafana.\n* Red Hat Gluster Storage 3, which only ships the client-side part of Redis in its packaged Grafana and Heketi.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10193"
},
{
"category": "external",
"summary": "RHBZ#1727668",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727668"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-22T13:36:12+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-Alt-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.4.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.5.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3-7.6.Z:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Server-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Server-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis5-redis-0:5.0.5-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.aarch64",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.ppc64le",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.s390x",
"7Workstation-RHSCL-3.3:rh-redis5-redis-debuginfo-0:5.0.5-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Stack buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
RHSA-2019:2508
Vulnerability from csaf_redhat - Published: 2019-08-15 16:03 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redis is now available for Red Hat OpenStack Platform 9.0 (Mitaka).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2508",
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2508.json"
}
],
"title": "Red Hat Security Advisory: redis security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:49+00:00",
"generator": {
"date": "2025-11-21T18:09:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2508",
"initial_release_date": "2019-08-15T16:03:43+00:00",
"revision_history": [
{
"date": "2019-08-15T16:03:43+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-15T16:03:43+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 9.0",
"product": {
"name": "Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:9::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.0.6-5.el7ost.x86_64",
"product": {
"name": "redis-0:3.0.6-5.el7ost.x86_64",
"product_id": "redis-0:3.0.6-5.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.0.6-5.el7ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product": {
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product_id": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@3.0.6-5.el7ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.0.6-5.el7ost.src",
"product": {
"name": "redis-0:3.0.6-5.el7ost.src",
"product_id": "redis-0:3.0.6-5.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.0.6-5.el7ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.0.6-5.el7ost.src as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.src"
},
"product_reference": "redis-0:3.0.6-5.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.0.6-5.el7ost.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.x86_64"
},
"product_reference": "redis-0:3.0.6-5.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64 as a component of Red Hat OpenStack Platform 9.0",
"product_id": "7Server-RH7-RHOS-9.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
},
"product_reference": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-9.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-15T16:03:43+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-9.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-9.0:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-9.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
RHSA-2019:2506
Vulnerability from csaf_redhat - Published: 2019-08-15 16:02 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redis is now available for Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2506",
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2506.json"
}
],
"title": "Red Hat Security Advisory: redis security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:52+00:00",
"generator": {
"date": "2025-11-21T18:09:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2506",
"initial_release_date": "2019-08-15T16:02:52+00:00",
"revision_history": [
{
"date": "2019-08-15T16:02:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-08-15T16:02:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7",
"product": {
"name": "Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7",
"product_id": "7Server-RH7-RHOS-9.0-OPTOOLS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack-optools:9::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.0.6-5.el7ost.x86_64",
"product": {
"name": "redis-0:3.0.6-5.el7ost.x86_64",
"product_id": "redis-0:3.0.6-5.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.0.6-5.el7ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product": {
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product_id": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@3.0.6-5.el7ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.0.6-5.el7ost.src",
"product": {
"name": "redis-0:3.0.6-5.el7ost.src",
"product_id": "redis-0:3.0.6-5.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.0.6-5.el7ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.0.6-5.el7ost.src as a component of Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7",
"product_id": "7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.src"
},
"product_reference": "redis-0:3.0.6-5.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0-OPTOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.0.6-5.el7ost.x86_64 as a component of Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7",
"product_id": "7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.x86_64"
},
"product_reference": "redis-0:3.0.6-5.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0-OPTOOLS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64 as a component of Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7",
"product_id": "7Server-RH7-RHOS-9.0-OPTOOLS:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
},
"product_reference": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-9.0-OPTOOLS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-08-15T16:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-9.0-OPTOOLS:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
RHSA-2019:2628
Vulnerability from csaf_redhat - Published: 2019-09-04 12:15 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redis is now available for Red Hat OpenStack Platform 13.0 (Queens).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2628",
"url": "https://access.redhat.com/errata/RHSA-2019:2628"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2628.json"
}
],
"title": "Red Hat Security Advisory: redis security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:59+00:00",
"generator": {
"date": "2025-11-21T18:09:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2628",
"initial_release_date": "2019-09-04T12:15:24+00:00",
"revision_history": [
{
"date": "2019-09-04T12:15:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-09-04T12:15:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 13.0",
"product": {
"name": "Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:13::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 13.0",
"product": {
"name": "Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:13::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.2.8-4.el7ost.ppc64le",
"product": {
"name": "redis-0:3.2.8-4.el7ost.ppc64le",
"product_id": "redis-0:3.2.8-4.el7ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.2.8-4.el7ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"product": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"product_id": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@3.2.8-4.el7ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.2.8-4.el7ost.x86_64",
"product": {
"name": "redis-0:3.2.8-4.el7ost.x86_64",
"product_id": "redis-0:3.2.8-4.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.2.8-4.el7ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"product": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"product_id": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@3.2.8-4.el7ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.2.8-4.el7ost.src",
"product": {
"name": "redis-0:3.2.8-4.el7ost.src",
"product_id": "redis-0:3.2.8-4.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.2.8-4.el7ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.src as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.src"
},
"product_reference": "redis-0:3.2.8-4.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.src as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.src"
},
"product_reference": "redis-0:3.2.8-4.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 13.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-09-04T12:15:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2628"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-13.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-13.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
RHSA-2019:1860
Vulnerability from csaf_redhat - Published: 2019-07-25 16:10 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rh-redis32-redis is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\n* redis: Heap corruption in lua_cmsgpack.c (CVE-2018-11218)\n\n* redis: Integer overflow in lua_struct.c:b_unpack() (CVE-2018-11219)\n\n* redis: Code execution in redis-cli via crafted command line arguments (CVE-2018-12326)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:1860",
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1590062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062"
},
{
"category": "external",
"summary": "1590067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067"
},
{
"category": "external",
"summary": "1594291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_1860.json"
}
],
"title": "Red Hat Security Advisory: rh-redis32-redis security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:09+00:00",
"generator": {
"date": "2025-11-21T18:09:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:1860",
"initial_release_date": "2019-07-25T16:10:02+00:00",
"revision_history": [
{
"date": "2019-07-25T16:10:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-07-25T16:10:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_software_collections:3::el6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Software Collections"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"product": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"product_id": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"product": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"product_id": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis32-redis-debuginfo@3.2.13-1.el7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"product": {
"name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"product_id": "rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"product": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"product_id": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis32-redis-debuginfo@3.2.13-1.el6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rh-redis32-redis-0:3.2.13-1.el7.src",
"product": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.src",
"product_id": "rh-redis32-redis-0:3.2.13-1.el7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el7?arch=src"
}
}
},
{
"category": "product_version",
"name": "rh-redis32-redis-0:3.2.13-1.el6.src",
"product": {
"name": "rh-redis32-redis-0:3.2.13-1.el6.src",
"product_id": "rh-redis32-redis-0:3.2.13-1.el6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rh-redis32-redis@3.2.13-1.el6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el6.src",
"relates_to_product_reference": "6Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64"
},
"product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"relates_to_product_reference": "6Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el6.src",
"relates_to_product_reference": "6Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64"
},
"product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"relates_to_product_reference": "6Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.4)",
"product_id": "7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.4.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.5)",
"product_id": "7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)",
"product_id": "7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3-7.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Server-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.src",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64 as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
},
"product_reference": "rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"relates_to_product_reference": "7Workstation-RHSCL-3.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-11218",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1590067"
}
],
"notes": [
{
"category": "description",
"text": "Memory Corruption was discovered in the cmsgpack library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2 because of stack-based buffer overflows.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap corruption in lua_cmsgpack.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-11218"
},
{
"category": "external",
"summary": "RHBZ#1590067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-11218",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11218"
},
{
"category": "external",
"summary": "http://antirez.com/news/119",
"url": "http://antirez.com/news/119"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-25T16:10:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "redis: Heap corruption in lua_cmsgpack.c"
},
{
"cve": "CVE-2018-11219",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2018-06-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1590062"
}
],
"notes": [
{
"category": "description",
"text": "An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Integer overflow in lua_struct.c:b_unpack()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-11219"
},
{
"category": "external",
"summary": "RHBZ#1590062",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1590062"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-11219",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11219"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-11219"
},
{
"category": "external",
"summary": "http://antirez.com/news/119",
"url": "http://antirez.com/news/119"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-25T16:10:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "redis: Integer overflow in lua_struct.c:b_unpack()"
},
{
"cve": "CVE-2018-12326",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2018-06-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1594291"
}
],
"notes": [
{
"category": "description",
"text": "The Redis command line tool \u0027redis-cli\u0027 is vulnerable to a buffer overflow through the -h (host) command line parameter. The redis-cli may be used by other services; if these services do not adequately filter the host input it could lead to code execution with the privilege level of that service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Code execution in redis-cli via crafted command line arguments",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-12326"
},
{
"category": "external",
"summary": "RHBZ#1594291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1594291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-12326",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12326"
}
],
"release_date": "2018-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-25T16:10:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "redis: Code execution in redis-cli via crafted command line arguments"
},
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-07-25T16:10:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.src",
"6Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el6.x86_64",
"6Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el6.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.4.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.5.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3-7.6.Z:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Server-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Server-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.src",
"7Workstation-RHSCL-3.3:rh-redis32-redis-0:3.2.13-1.el7.x86_64",
"7Workstation-RHSCL-3.3:rh-redis32-redis-debuginfo-0:3.2.13-1.el7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
RHSA-2019:2621
Vulnerability from csaf_redhat - Published: 2019-09-04 09:15 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redis is now available for Red Hat OpenStack Platform 14.0 (Rocky).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2621",
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2621.json"
}
],
"title": "Red Hat Security Advisory: redis security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:58+00:00",
"generator": {
"date": "2025-11-21T18:09:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2621",
"initial_release_date": "2019-09-04T09:15:42+00:00",
"revision_history": [
{
"date": "2019-09-04T09:15:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-09-04T09:15:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 14.0",
"product": {
"name": "Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-14.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:14::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 14.0",
"product": {
"name": "Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:14::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.2.8-4.el7ost.ppc64le",
"product": {
"name": "redis-0:3.2.8-4.el7ost.ppc64le",
"product_id": "redis-0:3.2.8-4.el7ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.2.8-4.el7ost?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"product": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"product_id": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@3.2.8-4.el7ost?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.2.8-4.el7ost.x86_64",
"product": {
"name": "redis-0:3.2.8-4.el7ost.x86_64",
"product_id": "redis-0:3.2.8-4.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.2.8-4.el7ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"product": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"product_id": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@3.2.8-4.el7ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.2.8-4.el7ost.src",
"product": {
"name": "redis-0:3.2.8-4.el7ost.src",
"product_id": "redis-0:3.2.8-4.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.2.8-4.el7ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.src as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.src"
},
"product_reference": "redis-0:3.2.8-4.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.src as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.src"
},
"product_reference": "redis-0:3.2.8-4.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64 as a component of Red Hat OpenStack Platform 14.0",
"product_id": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
},
"product_reference": "redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-09-04T09:15:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-14.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.src",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-0:3.2.8-4.el7ost.x86_64",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.ppc64le",
"7Server-RH7-RHOS-DEPLOYMENT-TOOLS-14.0:redis-debuginfo-0:3.2.8-4.el7ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
RHSA-2019:2630
Vulnerability from csaf_redhat - Published: 2019-09-04 12:15 - Updated: 2025-11-21 18:09Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for redis is now available for Red Hat OpenStack Platform 10.0 (Newton).\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Heap buffer overflow in HyperLogLog triggered by malicious client (CVE-2019-10192)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2019:2630",
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_2630.json"
}
],
"title": "Red Hat Security Advisory: redis security update",
"tracking": {
"current_release_date": "2025-11-21T18:09:59+00:00",
"generator": {
"date": "2025-11-21T18:09:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2019:2630",
"initial_release_date": "2019-09-04T12:15:34+00:00",
"revision_history": [
{
"date": "2019-09-04T12:15:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2019-09-04T12:15:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:09:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 10.0",
"product": {
"name": "Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:10::el7"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.0.6-5.el7ost.x86_64",
"product": {
"name": "redis-0:3.0.6-5.el7ost.x86_64",
"product_id": "redis-0:3.0.6-5.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.0.6-5.el7ost?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product": {
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product_id": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis-debuginfo@3.0.6-5.el7ost?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "redis-0:3.0.6-5.el7ost.src",
"product": {
"name": "redis-0:3.0.6-5.el7ost.src",
"product_id": "redis-0:3.0.6-5.el7ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/redis@3.0.6-5.el7ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.0.6-5.el7ost.src as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.src"
},
"product_reference": "redis-0:3.0.6-5.el7ost.src",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-0:3.0.6-5.el7ost.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.x86_64"
},
"product_reference": "redis-0:3.0.6-5.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64 as a component of Red Hat OpenStack Platform 10.0",
"product_id": "7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
},
"product_reference": "redis-debuginfo-0:3.0.6-5.el7ost.x86_64",
"relates_to_product_reference": "7Server-RH7-RHOS-10.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-10192",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2019-05-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1723918"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.\n* This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-10192"
},
{
"category": "external",
"summary": "RHBZ#1723918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1723918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-10192",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10192"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"category": "external",
"summary": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES",
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
}
],
"release_date": "2019-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2019-09-04T12:15:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.src",
"7Server-RH7-RHOS-10.0:redis-0:3.0.6-5.el7ost.x86_64",
"7Server-RH7-RHOS-10.0:redis-debuginfo-0:3.0.6-5.el7ost.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "redis: Heap buffer overflow in HyperLogLog triggered by malicious client"
}
]
}
cleanstart-2026-bx37171
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.4-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-BX37171",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:43:22.549529Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-BX37171.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-49844"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49844"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449",
"CVE-2025-46817",
"CVE-2025-46818",
"CVE-2025-46819",
"CVE-2025-49844"
]
}
cleanstart-2026-mj64494
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.2.5-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MJ64494",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T13:59:20.370058Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MJ64494.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449"
]
}
cleanstart-2026-fr00621
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.2.5-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-FR00621",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:36:52.496829Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-FR00621.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449"
]
}
cleanstart-2026-ng71279
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.2.5-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-NG71279",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:23:51.400746Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-NG71279.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449"
]
}
cleanstart-2026-wi17406
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.2.2-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-WI17406",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T17:35:28.375848Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-WI17406.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-49844"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49844"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449",
"CVE-2025-46817",
"CVE-2025-46818",
"CVE-2025-46819",
"CVE-2025-49844"
]
}
cleanstart-2026-ym75307
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.4.6-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-YM75307",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:34:22.430652Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-YM75307.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-49844"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49844"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449",
"CVE-2025-46817",
"CVE-2025-46818",
"CVE-2025-46819",
"CVE-2025-49844"
]
}
cleanstart-2026-di78859
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.2.5-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-DI78859",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:24:51.733190Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-DI78859.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-49844"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49844"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449",
"CVE-2025-46817",
"CVE-2025-46818",
"CVE-2025-46819",
"CVE-2025-49844"
]
}
cleanstart-2026-mz27698
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.4.6-r0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-MZ27698",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:39:52.940858Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-MZ27698.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2025-49844"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46817"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46818"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46819"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49844"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449",
"CVE-2025-46817",
"CVE-2025-46818",
"CVE-2025-46819",
"CVE-2025-49844"
]
}
cleanstart-2026-ju65303
Vulnerability from cleanstart
Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.
{
"affected": [
{
"package": {
"ecosystem": "CleanStart",
"name": "redis"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "7.2.5-r1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"credits": [],
"database_specific": {},
"details": "Multiple security vulnerabilities affect the redis package. Redis is an open source, in-memory database that persists on disk. See references for individual vulnerability details.",
"id": "CLEANSTART-2026-JU65303",
"modified": "2026-01-29T18:58:54Z",
"published": "2026-01-30T14:18:21.426991Z",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/cleanstart-dev/cleanstart-security-advisories/tree/main/advisories/2026/CLEANSTART-2026-JU65303.json"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://osv.dev/vulnerability/CVE-2024-31449"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8080"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10192"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10193"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14147"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32625"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32626"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32627"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32628"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32672"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32675"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32687"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-32762"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41099"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24736"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24834"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-35977"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3647"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-36824"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41053"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41056"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45145"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31227"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31228"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31449"
}
],
"related": [],
"schema_version": "1.7.3",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
],
"summary": "Redis is an open source, in-memory database that persists on disk",
"upstream": [
"CVE-2015-8080",
"CVE-2019-10192",
"CVE-2019-10193",
"CVE-2020-14147",
"CVE-2021-32625",
"CVE-2021-32626",
"CVE-2021-32627",
"CVE-2021-32628",
"CVE-2021-32672",
"CVE-2021-32675",
"CVE-2021-32687",
"CVE-2021-32762",
"CVE-2021-41099",
"CVE-2022-24736",
"CVE-2022-24834",
"CVE-2022-35977",
"CVE-2022-3647",
"CVE-2023-36824",
"CVE-2023-41053",
"CVE-2023-41056",
"CVE-2023-45145",
"CVE-2024-31227",
"CVE-2024-31228",
"CVE-2024-31449"
]
}
WID-SEC-W-2022-0517
Vulnerability from csaf_certbund - Published: 2019-08-06 22:00 - Updated: 2025-06-23 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0517 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2022-0517.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0517 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0517"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2332 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2332"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2336 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2336"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2308 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2308"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2285 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2285"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2290 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2290"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2280 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2283 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2283"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2272 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2272"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2276 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2276"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2258 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2258"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2229 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2229"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2237 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2196 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2196"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2197 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2197"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2189 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2189"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2177 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2177"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2178 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2178"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2162 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2162"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2157 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2157"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2137 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2137"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2125 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2125"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2126 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2112 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2101 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2101"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2075 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2075"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2049 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2049"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2052 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2052"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2047 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2047"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2048 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2048"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2035 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2035"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2037 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2037"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2017 vom 2019-08-06",
"url": "https://access.redhat.com/errata/RHSA-2019:2017"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:2437 vom 2019-08-12",
"url": "https://access.redhat.com/errata/RHSA-2019:2437"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2285 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2285.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2052 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2052.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2258 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2258.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2178 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2178.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2229 vom 2019-08-14",
"url": "http://linux.oracle.com/errata/ELSA-2019-2229.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2177 vom 2019-08-16",
"url": "http://linux.oracle.com/errata/ELSA-2019-2177.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2283 vom 2019-08-19",
"url": "http://linux.oracle.com/errata/ELSA-2019-2283.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2189 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2189.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2280 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2280.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2019-2332 vom 2019-08-21",
"url": "http://linux.oracle.com/errata/ELSA-2019-2332.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2267-1 vom 2019-09-02",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192267-1.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2101 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2101-Low-CentOS-7-exiv2-Security-Update-tp4645686.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2019:2258 vom 2019-09-18",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2019-2258-Moderate-CentOS-7-http-parser-Security-Update-tp4645679.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2730-1 vom 2019-10-22",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192730-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2019:2750-1 vom 2019-10-23",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20192750-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3338 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3338"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3651 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3651"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3575 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3575"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3583 vom 2019-11-06",
"url": "https://access.redhat.com/errata/RHSA-2019:3583"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3590 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3590"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3345 vom 2019-11-06",
"url": "https://access.redhat.com/errata/RHSA-2019:3345"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3497 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3497"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3335 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3335"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2019:3705 vom 2019-11-05",
"url": "https://access.redhat.com/errata/RHSA-2019:3705"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-209 vom 2019-12-22",
"url": "https://downloads.avaya.com/css/P8/documents/101060434"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2019-205 vom 2019-12-22",
"url": "https://downloads.avaya.com/css/P8/documents/101060432"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0471 vom 2020-02-11",
"url": "https://access.redhat.com/errata/RHSA-2020:0471"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0471 vom 2020-02-11",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0471-Moderate-CentOS-6-spice-gtk-Security-Update-tp4645840.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0595 vom 2020-02-25",
"url": "https://access.redhat.com/errata/RHSA-2020:0595"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0555-1 vom 2020-03-02",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200555-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0850 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0850"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:0851 vom 2020-03-17",
"url": "https://access.redhat.com/errata/RHSA-2020:0851"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0851 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0851-Moderate-CentOS-7-python-virtualenv-Security-Update-tp4645882.html"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2020:0850 vom 2020-03-25",
"url": "http://centos-announce.2309468.n4.nabble.com/CentOS-announce-CESA-2020-0850-Moderate-CentOS-7-python-pip-Security-Update-tp4645865.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1265 vom 2020-04-01",
"url": "https://access.redhat.com/errata/RHSA-2020:1265"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0921-1 vom 2020-04-04",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200921-1.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1471 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1471"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1464 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1464"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1461 vom 2020-04-14",
"url": "https://access.redhat.com/errata/RHSA-2020:1461"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1577 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1577"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1916 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1916"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:1605 vom 2020-04-28",
"url": "https://access.redhat.com/errata/RHSA-2020:1605"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2068 vom 2020-05-12",
"url": "https://access.redhat.com/errata/RHSA-2020:2068"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:2081 vom 2020-05-12",
"url": "https://access.redhat.com/errata/RHSA-2020:2081"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1792-1 vom 2020-06-26",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/007049.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:3194 vom 2020-07-28",
"url": "https://access.redhat.com/errata/RHSA-2020:3194"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2711-1 vom 2020-09-22",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-September/007450.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:2942-1 vom 2020-10-16",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-October/007582.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2020:4999 vom 2020-11-10",
"url": "https://access.redhat.com/errata/RHSA-2020:4999"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2470 vom 2020-12-01",
"url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00000.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:3842-1 vom 2020-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008077.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:3841-1 vom 2020-12-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2020-December/008078.html"
},
{
"category": "external",
"summary": "F5 Security Advisory K00409335 vom 2020-12-29",
"url": "https://support.f5.com/csp/article/K00409335?utm_source=f5support\u0026utm_medium=RSS"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2645 vom 2021-04-29",
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202107-15 vom 2021-07-08",
"url": "https://www.cybersecurity-help.cz/vdb/SB2021070803"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2802 vom 2021-10-31",
"url": "https://lists.debian.org/debian-lts-announce/2021/10/msg00030.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1448-1 vom 2022-04-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010858.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1819-1 vom 2022-05-23",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011137.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5497-1 vom 2022-06-30",
"url": "https://ubuntu.com/security/notices/USN-5497-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2614-1 vom 2022-08-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-August/011724.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5553-1 vom 2022-08-08",
"url": "https://ubuntu.com/security/notices/USN-5553-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5631-1 vom 2022-09-22",
"url": "https://ubuntu.com/security/notices/USN-5631-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5671-1 vom 2022-10-12",
"url": "https://ubuntu.com/security/notices/USN-5671-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:4252-1 vom 2022-11-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/013131.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1939 vom 2023-02-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1939.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1940 vom 2023-02-22",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-1940.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6980 vom 2023-11-21",
"url": "https://linux.oracle.com/errata/ELSA-2023-6980.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12605 vom 2024-09-02",
"url": "https://linux.oracle.com/errata/ELSA-2024-12605.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-253 vom 2025-06-24",
"url": "https://www.dell.com/support/kbdoc/000335065"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-23T22:00:00.000+00:00",
"generator": {
"date": "2025-06-24T07:44:55.519+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2022-0517",
"initial_release_date": "2019-08-06T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-08-06T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-08-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-08-13T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-08-21T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2019-09-02T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-09-18T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2019-10-09T22:00:00.000+00:00",
"number": "9",
"summary": "Referenz(en) aufgenommen: SUSE-SU-2019:1487-2"
},
{
"date": "2019-10-15T22:00:00.000+00:00",
"number": "10",
"summary": "Referenz(en) aufgenommen: FEDORA-2019-7B06F18A10, FEDORA-2019-A25D5DF3B4, FEDORA-2019-23638D42F3"
},
{
"date": "2019-10-21T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-10-23T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2019-11-05T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2019-12-22T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2020-01-30T23:00:00.000+00:00",
"number": "15",
"summary": "Referenz(en) aufgenommen: FEDORA-2020-CB7B7181A0, FEDORA-2020-1DFAA1963B"
},
{
"date": "2020-02-10T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-02-11T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-02-24T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-02T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-03-17T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-03-25T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2020-03-31T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-04-05T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-04-14T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-04-28T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-05-03T22:00:00.000+00:00",
"number": "26",
"summary": "Referenz(en) aufgenommen: USN-4349-1"
},
{
"date": "2020-05-12T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-06-28T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-07-28T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-09-22T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-10-18T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-11-09T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2020-11-30T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-12-16T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-12-28T23:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von F5 aufgenommen"
},
{
"date": "2021-04-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-07-07T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2021-09-08T22:00:00.000+00:00",
"number": "38",
"summary": "Referenz(en) aufgenommen: USN-5067-1"
},
{
"date": "2021-10-31T23:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-04-28T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-23T22:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-30T22:00:00.000+00:00",
"number": "42",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-08-01T22:00:00.000+00:00",
"number": "43",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-08-08T22:00:00.000+00:00",
"number": "44",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-09-22T22:00:00.000+00:00",
"number": "45",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-10-11T22:00:00.000+00:00",
"number": "46",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-11-28T23:00:00.000+00:00",
"number": "47",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-02-22T23:00:00.000+00:00",
"number": "48",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-11-21T23:00:00.000+00:00",
"number": "49",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "50",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-06-23T22:00:00.000+00:00",
"number": "51",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "51"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "T40",
"product": {
"name": "Dell PowerEdge T40",
"product_id": "T027537",
"product_identification_helper": {
"cpe": "cpe:/h:dell:poweredge:t40"
}
}
}
],
"category": "product_name",
"name": "PowerEdge"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "F5 BIG-IP",
"product": {
"name": "F5 BIG-IP",
"product_id": "T001663",
"product_identification_helper": {
"cpe": "cpe:/a:f5:big-ip:-"
}
}
}
],
"category": "vendor",
"name": "F5"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7",
"product": {
"name": "Red Hat Enterprise Linux 7",
"product_id": "T006054",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-3616",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2016-3616"
},
{
"cve": "CVE-2017-15111",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-15111"
},
{
"cve": "CVE-2017-15112",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-15112"
},
{
"cve": "CVE-2017-17724",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-17724"
},
{
"cve": "CVE-2017-18189",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18189"
},
{
"cve": "CVE-2017-18233",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18233"
},
{
"cve": "CVE-2017-18234",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18234"
},
{
"cve": "CVE-2017-18236",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18236"
},
{
"cve": "CVE-2017-18238",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-18238"
},
{
"cve": "CVE-2017-5731",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5731"
},
{
"cve": "CVE-2017-5732",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5732"
},
{
"cve": "CVE-2017-5733",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5733"
},
{
"cve": "CVE-2017-5734",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5734"
},
{
"cve": "CVE-2017-5735",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-5735"
},
{
"cve": "CVE-2017-6059",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-6059"
},
{
"cve": "CVE-2017-6413",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2017-6413"
},
{
"cve": "CVE-2018-0495",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-0495"
},
{
"cve": "CVE-2018-1000132",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000132"
},
{
"cve": "CVE-2018-1000852",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000852"
},
{
"cve": "CVE-2018-1000876",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1000876"
},
{
"cve": "CVE-2018-10689",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10689"
},
{
"cve": "CVE-2018-10772",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10772"
},
{
"cve": "CVE-2018-10893",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10893"
},
{
"cve": "CVE-2018-10958",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10958"
},
{
"cve": "CVE-2018-10998",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-10998"
},
{
"cve": "CVE-2018-11037",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11037"
},
{
"cve": "CVE-2018-11212",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11212"
},
{
"cve": "CVE-2018-11213",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11213"
},
{
"cve": "CVE-2018-11214",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11214"
},
{
"cve": "CVE-2018-1122",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-1122"
},
{
"cve": "CVE-2018-11813",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-11813"
},
{
"cve": "CVE-2018-12121",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12121"
},
{
"cve": "CVE-2018-12181",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12181"
},
{
"cve": "CVE-2018-12264",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12264"
},
{
"cve": "CVE-2018-12265",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12265"
},
{
"cve": "CVE-2018-12404",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12404"
},
{
"cve": "CVE-2018-12641",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12641"
},
{
"cve": "CVE-2018-12697",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-12697"
},
{
"cve": "CVE-2018-13259",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13259"
},
{
"cve": "CVE-2018-13346",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13346"
},
{
"cve": "CVE-2018-13347",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-13347"
},
{
"cve": "CVE-2018-14046",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14046"
},
{
"cve": "CVE-2018-14348",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14348"
},
{
"cve": "CVE-2018-14498",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-14498"
},
{
"cve": "CVE-2018-16062",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16062"
},
{
"cve": "CVE-2018-16402",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16402"
},
{
"cve": "CVE-2018-16403",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16403"
},
{
"cve": "CVE-2018-16548",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16548"
},
{
"cve": "CVE-2018-16838",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-16838"
},
{
"cve": "CVE-2018-17282",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17282"
},
{
"cve": "CVE-2018-17336",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17336"
},
{
"cve": "CVE-2018-17581",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-17581"
},
{
"cve": "CVE-2018-18074",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2018-18310",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18310"
},
{
"cve": "CVE-2018-18520",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18520"
},
{
"cve": "CVE-2018-18521",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18521"
},
{
"cve": "CVE-2018-18584",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18584"
},
{
"cve": "CVE-2018-18585",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18585"
},
{
"cve": "CVE-2018-18915",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-18915"
},
{
"cve": "CVE-2018-19044",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19044"
},
{
"cve": "CVE-2018-19107",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19107"
},
{
"cve": "CVE-2018-19108",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19108"
},
{
"cve": "CVE-2018-19198",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19198"
},
{
"cve": "CVE-2018-19199",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19199"
},
{
"cve": "CVE-2018-19208",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19208"
},
{
"cve": "CVE-2018-19535",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19535"
},
{
"cve": "CVE-2018-19607",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-19607"
},
{
"cve": "CVE-2018-20060",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20060"
},
{
"cve": "CVE-2018-20096",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20096"
},
{
"cve": "CVE-2018-20097",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20097"
},
{
"cve": "CVE-2018-20098",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20098"
},
{
"cve": "CVE-2018-20099",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20099"
},
{
"cve": "CVE-2018-20532",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20532"
},
{
"cve": "CVE-2018-20533",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20533"
},
{
"cve": "CVE-2018-20534",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-20534"
},
{
"cve": "CVE-2018-3613",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-3613"
},
{
"cve": "CVE-2018-5407",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-5407"
},
{
"cve": "CVE-2018-6541",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-6541"
},
{
"cve": "CVE-2018-7159",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7159"
},
{
"cve": "CVE-2018-7409",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7409"
},
{
"cve": "CVE-2018-7485",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7485"
},
{
"cve": "CVE-2018-7730",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-7730"
},
{
"cve": "CVE-2018-8976",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-8976"
},
{
"cve": "CVE-2018-8977",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-8977"
},
{
"cve": "CVE-2018-9305",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2018-9305"
},
{
"cve": "CVE-2019-0160",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-0160"
},
{
"cve": "CVE-2019-0161",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-0161"
},
{
"cve": "CVE-2019-10153",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10153"
},
{
"cve": "CVE-2019-10192",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10192"
},
{
"cve": "CVE-2019-10193",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-10193"
},
{
"cve": "CVE-2019-11236",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-11236"
},
{
"cve": "CVE-2019-3811",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-3811"
},
{
"cve": "CVE-2019-7149",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7149"
},
{
"cve": "CVE-2019-7150",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7150"
},
{
"cve": "CVE-2019-7664",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7664"
},
{
"cve": "CVE-2019-7665",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-7665"
},
{
"cve": "CVE-2019-8379",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-8379"
},
{
"cve": "CVE-2019-8383",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-8383"
},
{
"cve": "CVE-2019-9755",
"product_status": {
"known_affected": [
"2951",
"T002207",
"T000126",
"T027537",
"T001663",
"398363",
"T012167",
"1727",
"T004914",
"T006054"
]
},
"release_date": "2019-08-06T22:00:00.000+00:00",
"title": "CVE-2019-9755"
}
]
}
FKIE_CVE-2019-10192
Vulnerability from fkie_nvd - Published: 2019-07-11 19:15 - Updated: 2024-11-21 04:18| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://www.securityfocus.com/bid/109290 | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:1819 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:1860 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:2002 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:2506 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:2508 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:2621 | Third Party Advisory | |
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2019:2630 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES | Release Notes, Vendor Advisory | |
| secalert@redhat.com | https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES | Release Notes, Vendor Advisory | |
| secalert@redhat.com | https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES | Release Notes, Vendor Advisory | |
| secalert@redhat.com | https://seclists.org/bugtraq/2019/Jul/19 | Mailing List, Third Party Advisory | |
| secalert@redhat.com | https://security.gentoo.org/glsa/201908-04 | Third Party Advisory | |
| secalert@redhat.com | https://usn.ubuntu.com/4061-1/ | Third Party Advisory | |
| secalert@redhat.com | https://www.debian.org/security/2019/dsa-4480 | Third Party Advisory | |
| secalert@redhat.com | https://www.oracle.com/security-alerts/cpujul2020.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/109290 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1819 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:1860 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2002 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2506 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2508 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2621 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2019:2630 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES | Release Notes, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/bugtraq/2019/Jul/19 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/201908-04 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://usn.ubuntu.com/4061-1/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2019/dsa-4480 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2020.html | Patch, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| redislabs | redis | * | |
| redislabs | redis | * | |
| redislabs | redis | * | |
| redhat | openstack | 9 | |
| redhat | openstack | 10 | |
| redhat | openstack | 13 | |
| redhat | openstack | 14 | |
| redhat | software_collections | 1.0 | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux_eus | 8.1 | |
| redhat | enterprise_linux_eus | 8.2 | |
| redhat | enterprise_linux_eus | 8.4 | |
| redhat | enterprise_linux_server_aus | 8.2 | |
| redhat | enterprise_linux_server_aus | 8.4 | |
| redhat | enterprise_linux_server_tus | 8.2 | |
| redhat | enterprise_linux_server_tus | 8.4 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| canonical | ubuntu_linux | 16.04 | |
| canonical | ubuntu_linux | 18.04 | |
| canonical | ubuntu_linux | 19.04 | |
| oracle | communications_operations_monitor | 3.4 | |
| oracle | communications_operations_monitor | 4.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69CAD776-FA0E-499F-BA66-5C77DCC1B115",
"versionEndExcluding": "3.2.13",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B901D22B-C584-4BEE-98C2-9B11B9FBD7A7",
"versionEndExcluding": "4.0.14",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4352C6A2-43E2-4DC7-BFD6-2A9E6A8B6EB9",
"versionEndExcluding": "5.0.4",
"versionStartIncluding": "5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*",
"matchCriteriaId": "F40C26BE-56CB-4022-A1D8-3CA0A8F87F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*",
"matchCriteriaId": "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
"matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openstack:14:*:*:*:*:*:*:*",
"matchCriteriaId": "EB7F358B-5E56-41AB-BB8A-23D3CB7A248B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D7EE4B6-A6EC-4B9B-91DF-79615796673F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "92BC9265-6959-4D37-BE5E-8C45E98992F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B09ACF2D-D83F-4A86-8185-9569605D8EE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D52F557F-D0A0-43D3-85F1-F10B6EBFAEDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EF30C76E-7E58-4D76-89A8-53405685DA86",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer."
},
{
"lang": "es",
"value": "Se detect\u00f3 una vulnerabilidad de desbordamiento del b\u00fafer de la pila en hyperloglog data structure versiones 3.x anteriores a 3.2.13, versiones 4.x anteriores a 4.0.14 y versiones 5.x anteriores a 5.0.4 de Redis. Por la corrupci\u00f3n cuidadosa de un hyperloglog usando el comando SETRANGE, un atacante podr\u00eda enga\u00f1ar la interpretaci\u00f3n de Redis de codificaci\u00f3n HLL densa para escribir hasta 3 bytes m\u00e1s all\u00e1 del final de un b\u00fafer asignado a la pila."
}
],
"id": "CVE-2019-10192",
"lastModified": "2024-11-21T04:18:37.363",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "secalert@redhat.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-07-11T19:15:12.627",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/109290"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
},
{
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"source": "secalert@redhat.com",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4061-1/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/109290"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1819"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1860"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2506"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2508"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2621"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/errata/RHSA-2019:2630"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/bugtraq/2019/Jul/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/201908-04"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://usn.ubuntu.com/4061-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2019/dsa-4480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2020.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.