Количество 23
Количество 23
CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.
CVE-2025-32023
Redis allows out of bounds writes in hyperloglog commands leading to RCE
CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. Fro ...
BDU:2025-08113
Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2025:03073-1
Security update for redis
SUSE-SU-2025:02680-1
Security update for redis
SUSE-SU-2025:02594-1
Security update for valkey
SUSE-SU-2025:02593-1
Security update for valkey
SUSE-SU-2025:02579-1
Security update for redis
ROS-20250904-11
Уязвимость valkey
RLSA-2025:12006
Important: redis:6 security update
RLSA-2025:11453
Important: redis security update
ELSA-2025-12006
ELSA-2025-12006: redis:6 security update (IMPORTANT)
ELSA-2025-11453
ELSA-2025-11453: redis security update (IMPORTANT)
SUSE-SU-2025:02681-1
Security update for redis
SUSE-SU-2025:02679-1
Security update for redis
RLSA-2025:12008
Important: redis:7 security update
RLSA-2025:11401
Important: valkey security update
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands. | CVSS3: 7 | 0% Низкий | 6 месяцев назад | |
CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands. | CVSS3: 8.8 | 0% Низкий | 6 месяцев назад | |
CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands. | CVSS3: 7 | 0% Низкий | 6 месяцев назад | |
CVE-2025-32023 Redis allows out of bounds writes in hyperloglog commands leading to RCE | CVSS3: 7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. Fro ... | CVSS3: 7 | 0% Низкий | 6 месяцев назад | |
BDU:2025-08113 Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код | CVSS3: 7 | 0% Низкий | 6 месяцев назад | |
SUSE-SU-2025:03073-1 Security update for redis | 4 месяца назад | |||
SUSE-SU-2025:02680-1 Security update for redis | 5 месяцев назад | |||
SUSE-SU-2025:02594-1 Security update for valkey | 5 месяцев назад | |||
SUSE-SU-2025:02593-1 Security update for valkey | 5 месяцев назад | |||
SUSE-SU-2025:02579-1 Security update for redis | 5 месяцев назад | |||
ROS-20250904-11 Уязвимость valkey | CVSS2: 6 | 0% Низкий | 4 месяца назад | |
RLSA-2025:12006 Important: redis:6 security update | 5 месяцев назад | |||
RLSA-2025:11453 Important: redis security update | 3 месяца назад | |||
ELSA-2025-12006 ELSA-2025-12006: redis:6 security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2025-11453 ELSA-2025-11453: redis security update (IMPORTANT) | 5 месяцев назад | |||
SUSE-SU-2025:02681-1 Security update for redis | 5 месяцев назад | |||
SUSE-SU-2025:02679-1 Security update for redis | 5 месяцев назад | |||
RLSA-2025:12008 Important: redis:7 security update | 3 месяца назад | |||
RLSA-2025:11401 Important: valkey security update | 3 месяца назад |
Уязвимостей на страницу