{"id":"UBUNTU-CVE-2018-11219","details":"An Integer Overflow issue was discovered in the struct library in the Lua subsystem in Redis before 3.2.12, 4.x before 4.0.10, and 5.x before 5.0 RC2, leading to a failure of bounds checking.","modified":"2025-09-08T16:44:52Z","published":"2018-06-17T17:29:00Z","upstream":["CVE-2018-11219"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-11219"},{"type":"REPORT","url":"https://github.com/antirez/redis/issues/5017"},{"type":"REPORT","url":"http://antirez.com/news/119"},{"type":"REPORT","url":"https://github.com/antirez/redis/commit/1eb08bcd4634ae42ec45e8284923ac048beaa4c3"},{"type":"REPORT","url":"https://github.com/antirez/redis/commit/e89086e09a38cc6713bcd4b9c29abf92cf393936"},{"type":"REPORT","url":"https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES"},{"type":"REPORT","url":"https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES"},{"type":"REPORT","url":"https://www.debian.org/security/2018/dsa-4230"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-11219"}],"affected":[{"package":{"name":"redis","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/redis@2:2.8.4-2ubuntu0.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:2.8.4-2ubuntu0.2"}]}],"versions":["2:2.6.13-1","2:2.6.16-3","2:2.8.0-1","2:2.8.2-1","2:2.8.4-2"],"ecosystem_specific":{"binaries":[{"binary_version":"2:2.8.4-2ubuntu0.2","binary_name":"redis-server"},{"binary_version":"2:2.8.4-2ubuntu0.2","binary_name":"redis-tools"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-11219.json"}},{"package":{"name":"redis","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/redis@2:3.0.6-1ubuntu0.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:3.0.6-1ubuntu0.2"}]}],"versions":["2:3.0.3-3","2:3.0.5-1","2:3.0.5-2","2:3.0.5-3","2:3.0.5-4","2:3.0.6-1"],"ecosystem_specific":{"binaries":[{"binary_version":"2:3.0.6-1ubuntu0.2","binary_name":"redis-sentinel"},{"binary_version":"2:3.0.6-1ubuntu0.2","binary_name":"redis-server"},{"binary_version":"2:3.0.6-1ubuntu0.2","binary_name":"redis-tools"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-11219.json"}},{"package":{"name":"redis","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/redis@5:4.0.9-1ubuntu0.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"5:4.0.9-1ubuntu0.1"}]}],"versions":["4:4.0.1-7","4:4.0.2-6","4:4.0.2-9","5:4.0.5-1","5:4.0.6-1","5:4.0.6-2","5:4.0.7-1","5:4.0.8-1","5:4.0.8-2","5:4.0.9-1"],"ecosystem_specific":{"binaries":[{"binary_version":"5:4.0.9-1ubuntu0.1","binary_name":"redis"},{"binary_version":"5:4.0.9-1ubuntu0.1","binary_name":"redis-sentinel"},{"binary_version":"5:4.0.9-1ubuntu0.1","binary_name":"redis-server"},{"binary_version":"5:4.0.9-1ubuntu0.1","binary_name":"redis-tools"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-11219.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}