CVE-2019-10192
Publication date 11 July 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
Status
Package | Ubuntu Release | Status |
---|---|---|
redis | ||
18.04 LTS bionic |
Fixed 5:4.0.9-1ubuntu0.2
|
|
16.04 LTS xenial |
Fixed 2:3.0.6-1ubuntu0.4
|
|
14.04 LTS trusty |
Not affected
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.2 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | High |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-4061-1
- Redis vulnerabilities
- 16 July 2019
Other references
- https://github.com/antirez/redis/issues/6215 (upstream announcement)
- https://github.com/antirez/redis/commit/e216ceaf0e099536fe3658a29dcb725d812364e0
- https://github.com/antirez/redis/commit/9f13b2bd4967334b1701c6eccdf53760cb13f79e
- https://github.com/antirez/redis/commit/ef1833b3f9d02261617b757fd6ebe0ec3f1be507 (5.0.4)
- https://github.com/antirez/redis/commit/7f79849caa006f0d760b6c7e17f7796e3be92b4f (5.0.4)
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192
- https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
- https://www.cve.org/CVERecord?id=CVE-2019-10192