CVE-2018-11219

An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.
References
Link Resource
http://antirez.com/news/119 Exploit Third Party Advisory
http://www.securityfocus.com/bid/104552 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0052 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1860
https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 Patch Third Party Advisory
https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 Patch Third Party Advisory
https://github.com/antirez/redis/issues/5017 Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES Third Party Advisory
https://security.gentoo.org/glsa/201908-04
https://www.debian.org/security/2018/dsa-4230 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
http://antirez.com/news/119 Exploit Third Party Advisory
http://www.securityfocus.com/bid/104552 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2019:0052 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0094 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1860
https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 Patch Third Party Advisory
https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 Patch Third Party Advisory
https://github.com/antirez/redis/issues/5017 Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES Third Party Advisory
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES Third Party Advisory
https://security.gentoo.org/glsa/201908-04
https://www.debian.org/security/2018/dsa-4230 Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redislabs:redis:5.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*

History

21 Nov 2024, 03:42

Type Values Removed Values Added
References () http://antirez.com/news/119 - Exploit, Third Party Advisory () http://antirez.com/news/119 - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/104552 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104552 - Third Party Advisory, VDB Entry
References () https://access.redhat.com/errata/RHSA-2019:0052 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0052 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0094 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0094 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1860 - () https://access.redhat.com/errata/RHSA-2019:1860 -
References () https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 - Patch, Third Party Advisory () https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3 - Patch, Third Party Advisory
References () https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 - Patch, Third Party Advisory () https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936 - Patch, Third Party Advisory
References () https://github.com/antirez/redis/issues/5017 - Third Party Advisory () https://github.com/antirez/redis/issues/5017 - Third Party Advisory
References () https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES - Third Party Advisory () https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES - Third Party Advisory
References () https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES - Third Party Advisory () https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES - Third Party Advisory
References () https://security.gentoo.org/glsa/201908-04 - () https://security.gentoo.org/glsa/201908-04 -
References () https://www.debian.org/security/2018/dsa-4230 - Third Party Advisory () https://www.debian.org/security/2018/dsa-4230 - Third Party Advisory
References () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory () https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html - Patch, Third Party Advisory

Information

Published : 2018-06-17 17:29

Updated : 2024-11-21 03:42


NVD link : CVE-2018-11219

Mitre link : CVE-2018-11219

CVE.ORG link : CVE-2018-11219


JSON object : View

Products Affected

redhat

  • openstack

debian

  • debian_linux

redislabs

  • redis

oracle

  • communications_operations_monitor
CWE
CWE-190

Integer Overflow or Wraparound