Количество 38
Количество 38
SUSE-SU-2025:02681-1
Security update for redis
SUSE-SU-2025:02679-1
Security update for redis
RLSA-2025:11401
Important: valkey security update
ELSA-2025-12008
ELSA-2025-12008: redis:7 security update (IMPORTANT)
ELSA-2025-11401
ELSA-2025-11401: valkey security update (IMPORTANT)
SUSE-SU-2025:03073-1
Security update for redis
SUSE-SU-2025:02680-1
Security update for redis
SUSE-SU-2025:02594-1
Security update for valkey
SUSE-SU-2025:02593-1
Security update for valkey
SUSE-SU-2025:02579-1
Security update for redis
ELSA-2025-12006
ELSA-2025-12006: redis:6 security update (IMPORTANT)
ELSA-2025-11453
ELSA-2025-11453: redis security update (IMPORTANT)
CVE-2025-27151
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
CVE-2025-27151
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
CVE-2025-27151
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
CVE-2025-27151
redis-check-aof may lead to stack overflow and potential RCE
CVE-2025-27151
Redis is an open source, in-memory database that persists on disk. In ...
SUSE-SU-2025:02190-1
Security update for redis
ROS-20250710-06
Уязвимость redis
BDU:2025-08608
Уязвимость команды redis-check-aof системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
SUSE-SU-2025:02681-1 Security update for redis | 3 месяца назад | |||
SUSE-SU-2025:02679-1 Security update for redis | 3 месяца назад | |||
RLSA-2025:11401 Important: valkey security update | около 1 месяца назад | |||
ELSA-2025-12008 ELSA-2025-12008: redis:7 security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-11401 ELSA-2025-11401: valkey security update (IMPORTANT) | 4 месяца назад | |||
SUSE-SU-2025:03073-1 Security update for redis | 2 месяца назад | |||
SUSE-SU-2025:02680-1 Security update for redis | 3 месяца назад | |||
SUSE-SU-2025:02594-1 Security update for valkey | 3 месяца назад | |||
SUSE-SU-2025:02593-1 Security update for valkey | 3 месяца назад | |||
SUSE-SU-2025:02579-1 Security update for redis | 3 месяца назад | |||
ELSA-2025-12006 ELSA-2025-12006: redis:6 security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-11453 ELSA-2025-11453: redis security update (IMPORTANT) | 4 месяца назад | |||
CVE-2025-27151 Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | CVSS3: 4.7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-27151 Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | CVSS3: 2.5 | 0% Низкий | 5 месяцев назад | |
CVE-2025-27151 Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | CVSS3: 4.7 | 0% Низкий | 5 месяцев назад | |
CVE-2025-27151 redis-check-aof may lead to stack overflow and potential RCE | CVSS3: 4.7 | 0% Низкий | 4 месяца назад | |
CVE-2025-27151 Redis is an open source, in-memory database that persists on disk. In ... | CVSS3: 4.7 | 0% Низкий | 5 месяцев назад | |
SUSE-SU-2025:02190-1 Security update for redis | 0% Низкий | 4 месяца назад | ||
ROS-20250710-06 Уязвимость redis | CVSS3: 4.7 | 0% Низкий | 4 месяца назад | |
BDU:2025-08608 Уязвимость команды redis-check-aof системы управления базами данных (СУБД) Redis, позволяющая нарушителю выполнить произвольный код | CVSS3: 4.7 | 0% Низкий | 5 месяцев назад |
Уязвимостей на страницу