An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:42
Type | Values Removed | Values Added |
---|---|---|
References | () http://antirez.com/news/119 - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/104552 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:0052 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:0094 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1860 - | |
References | () https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 - Patch, Third Party Advisory | |
References | () https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 - Patch, Third Party Advisory | |
References | () https://github.com/antirez/redis/issues/5017 - Third Party Advisory | |
References | () https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES - Third Party Advisory | |
References | () https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201908-04 - | |
References | () https://www.debian.org/security/2018/dsa-4230 - Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory |
Information
Published : 2018-06-17 17:29
Updated : 2024-11-21 03:42
NVD link : CVE-2018-11219
Mitre link : CVE-2018-11219
CVE.ORG link : CVE-2018-11219
JSON object : View
Products Affected
redhat
- openstack
debian
- debian_linux
redislabs
- redis
oracle
- communications_operations_monitor
CWE
CWE-190
Integer Overflow or Wraparound