CVE-2019-10193
Publication date 11 July 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Status
Package | Ubuntu Release | Status |
---|---|---|
redis | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.2 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4061-1
- Redis vulnerabilities
- 16 July 2019
Other references
- https://bugzilla.redhat.com/show_bug.cgi?id=1727668
- https://github.com/antirez/redis/issues/6214
- https://github.com/antirez/redis/issues/6215 (upstream announcement)
- https://github.com/antirez/redis/commit/a4b90be9fcd5e1668ac941cabce3b1ab38dbe326 (master)
- https://github.com/antirez/redis/commit/12b5ff109508c2a192f700c7738da7e7f09670f1 (5.0.4)
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10193
- https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
- https://www.cve.org/CVERecord?id=CVE-2019-10193