CVE-2019-10193 (retired)

A stack-buffer overflow vulnerability was found in the Redis hyperloglog
data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before
5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker
could cause Redis to perform controlled increments of up to 12 bytes past
the end of a stack-allocated buffer.
Source: redis (LP Ubuntu Debian)
Upstream:released (5:5.0.4-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (code not present)
Ubuntu 19.04 (Disco Dingo):released (5:5.0.3-4ubuntu0.1)
Ubuntu 19.10 (Eoan):not-affected (5:5.0.5-1)
More Information

Updated: 2019-07-16 15:14:57 UTC (commit fd678f65e8c4bb904f8dda375355e490c24f5f84)