http://bugzilla.opensuse.org/show_bug.cgi?id=1140680 Bug ID: 1140680 Summary: VUL-0: CVE-2019-10192: redis: Heap buffer overflow Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.1 Hardware: Other URL: https://smash.suse.de/issue/236623/ OS: Other Status: NEW Severity: Major Priority: P5 - None Component: Other Assignee: mrueckert@suse.com Reporter: abergmann@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- rh#1723918 Heap buffer overflow with corrupted hyperloglog data structure. By carefully corrupting a hyperloglog structure in redis using the SETRANGE command, an attacker could trick redis' interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer. Upstream fixes: https://github.com/antirez/redis/commit/e216ceaf0e099536fe3658a29dcb725d8123... https://github.com/antirez/redis/commit/9f13b2bd4967334b1701c6eccdf53760cb13... References: https://bugzilla.redhat.com/show_bug.cgi?id=1723918 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-10192 https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES -- You are receiving this mail because: You are on the CC list for the bug.