A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "2:3.0.6-1ubuntu0.4", "binary_name": "redis-sentinel" }, { "binary_version": "2:3.0.6-1ubuntu0.4", "binary_name": "redis-server" }, { "binary_version": "2:3.0.6-1ubuntu0.4", "binary_name": "redis-server-dbgsym" }, { "binary_version": "2:3.0.6-1ubuntu0.4", "binary_name": "redis-tools" }, { "binary_version": "2:3.0.6-1ubuntu0.4", "binary_name": "redis-tools-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "5:4.0.9-1ubuntu0.2", "binary_name": "redis" }, { "binary_version": "5:4.0.9-1ubuntu0.2", "binary_name": "redis-sentinel" }, { "binary_version": "5:4.0.9-1ubuntu0.2", "binary_name": "redis-server" }, { "binary_version": "5:4.0.9-1ubuntu0.2", "binary_name": "redis-tools" }, { "binary_version": "5:4.0.9-1ubuntu0.2", "binary_name": "redis-tools-dbgsym" } ] }