Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-0693

Опубликовано: 28 янв. 2025
Источник: oracle-oval
Платформа: Oracle Linux 9

Описание

ELSA-2025-0693: redis security update (IMPORTANT)

[6.2.17-1] -- rebase to 6.2.17 for CVE-2024-46981

[6.2.16-1]

  • rebase to 6.2.16 RHEL-26627

Обновленные пакеты

Oracle Linux 9

Oracle Linux aarch64

redis

6.2.17-1.el9_5

redis-devel

6.2.17-1.el9_5

redis-doc

6.2.17-1.el9_5

Oracle Linux x86_64

redis

6.2.17-1.el9_5

redis-devel

6.2.17-1.el9_5

redis-doc

6.2.17-1.el9_5

Связанные уязвимости

oracle-oval
5 месяцев назад

ELSA-2025-0595: redis:6 security update (IMPORTANT)

suse-cvrf
5 месяцев назад

Security update for redis

CVSS3: 7
ubuntu
почти 2 года назад

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.

CVSS3: 7
redhat
почти 2 года назад

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.

CVSS3: 7
nvd
почти 2 года назад

Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. The problem is fixed in versions 7.0.12, 6.2.13, and 6.0.20.