Количество 24
Количество 24
SUSE-SU-2025:0163-1
Security update for redis
SUSE-SU-2025:0161-1
Security update for redis7
SUSE-SU-2025:0160-1
Security update for redis7
RLSA-2025:0692
Important: redis:7 security update
ELSA-2025-0692
ELSA-2025-0692: redis:7 security update (IMPORTANT)
ROS-20250114-13
Множественные уязвимости redis
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
CVE-2024-51741
Redis allows denial-of-service due to malformed ACL selectors
CVE-2024-51741
Redis is an open source, in-memory database that persists on disk. An ...
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
CVE-2024-46981
Redis' Lua library commands may lead to remote code execution
CVE-2024-46981
Redis is an open source, in-memory database that persists on disk. An ...
BDU:2025-00449
Уязвимость системы управления базами данных Redis, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании
SUSE-SU-2025:0162-1
Security update for redis
BDU:2025-00214
Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
SUSE-SU-2025:0081-1
Security update for redis
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:0163-1 Security update for redis | 11 месяцев назад | |||
SUSE-SU-2025:0161-1 Security update for redis7 | 11 месяцев назад | |||
SUSE-SU-2025:0160-1 Security update for redis7 | 11 месяцев назад | |||
RLSA-2025:0692 Important: redis:7 security update | 9 месяцев назад | |||
ELSA-2025-0692 ELSA-2025-0692: redis:7 security update (IMPORTANT) | 11 месяцев назад | |||
ROS-20250114-13 Множественные уязвимости redis | CVSS3: 4.4 | 11 месяцев назад | ||
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | 11 месяцев назад | |
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | 11 месяцев назад | |
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. | CVSS3: 4.4 | 0% Низкий | 11 месяцев назад | |
CVE-2024-51741 Redis allows denial-of-service due to malformed ACL selectors | CVSS3: 4.4 | 0% Низкий | 11 месяцев назад | |
CVE-2024-51741 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 4.4 | 0% Низкий | 11 месяцев назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 65% Средний | 11 месяцев назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 65% Средний | 11 месяцев назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands. | CVSS3: 7 | 65% Средний | 11 месяцев назад | |
CVE-2024-46981 Redis' Lua library commands may lead to remote code execution | CVSS3: 7 | 65% Средний | 11 месяцев назад | |
CVE-2024-46981 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 7 | 65% Средний | 11 месяцев назад | |
BDU:2025-00449 Уязвимость системы управления базами данных Redis, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 4.4 | 0% Низкий | около 1 года назад | |
SUSE-SU-2025:0162-1 Security update for redis | 65% Средний | 11 месяцев назад | ||
BDU:2025-00214 Уязвимость системы управления базами данных (СУБД) Redis, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код | CVSS3: 7 | 65% Средний | 11 месяцев назад | |
SUSE-SU-2025:0081-1 Security update for redis | 11 месяцев назад |
Уязвимостей на страницу