CVE-2019-10192 (retired)

A heap-buffer overflow vulnerability was found in the Redis hyperloglog
data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before
5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an
attacker could trick Redis interpretation of dense HLL encoding to write up
to 3 bytes beyond the end of a heap-allocated buffer.
Source: redis (LP Ubuntu Debian)
Upstream:released (5:5.0.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):released (2:3.0.6-1ubuntu0.4)
Ubuntu 18.04 LTS (Bionic Beaver):released (5:4.0.9-1ubuntu0.2)
Ubuntu 18.10 (Cosmic Cuttlefish):ignored (reached end-of-life)
Ubuntu 19.04 (Disco Dingo):released (5:5.0.3-4ubuntu0.1)
Ubuntu 19.10 (Eoan):not-affected (5:5.0.5-1)
More Information

Updated: 2019-07-18 17:45:13 UTC (commit 649f8c6455205380e35ed054e9ea734222c716bb)