Количество 22
Количество 22

SUSE-SU-2025:02680-1
Security update for redis

SUSE-SU-2025:02594-1
Security update for valkey

SUSE-SU-2025:02593-1
Security update for valkey

SUSE-SU-2025:02579-1
Security update for redis
ELSA-2025-12006
ELSA-2025-12006: redis:6 security update (IMPORTANT)
ELSA-2025-11453
ELSA-2025-11453: redis security update (IMPORTANT)

SUSE-SU-2025:02681-1
Security update for redis

SUSE-SU-2025:02679-1
Security update for redis
ELSA-2025-12008
ELSA-2025-12008: redis:7 security update (IMPORTANT)
ELSA-2025-11401
ELSA-2025-11401: valkey security update (IMPORTANT)

CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVE-2025-48367
CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An ...

CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands.

CVE-2025-32023
CVE-2025-32023
Redis is an open source, in-memory database that persists on disk. Fro ...
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:02680-1 Security update for redis | 6 дней назад | ||
![]() | SUSE-SU-2025:02594-1 Security update for valkey | 9 дней назад | ||
![]() | SUSE-SU-2025:02593-1 Security update for valkey | 9 дней назад | ||
![]() | SUSE-SU-2025:02579-1 Security update for redis | 10 дней назад | ||
ELSA-2025-12006 ELSA-2025-12006: redis:6 security update (IMPORTANT) | 13 дней назад | |||
ELSA-2025-11453 ELSA-2025-11453: redis security update (IMPORTANT) | 20 дней назад | |||
![]() | SUSE-SU-2025:02681-1 Security update for redis | 6 дней назад | ||
![]() | SUSE-SU-2025:02679-1 Security update for redis | 6 дней назад | ||
ELSA-2025-12008 ELSA-2025-12008: redis:7 security update (IMPORTANT) | 12 дней назад | |||
ELSA-2025-11401 ELSA-2025-11401: valkey security update (IMPORTANT) | 21 день назад | |||
![]() | CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. | CVSS3: 5.3 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад |
![]() | CVSS3: 7.5 | 0% Низкий | 13 дней назад | |
CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад | |
![]() | CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands. | CVSS3: 7 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands. | CVSS3: 8.8 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations implemented. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing hyperloglog operations. This can be done using ACL to restrict HLL commands. | CVSS3: 7 | 0% Низкий | около 1 месяца назад |
![]() | CVSS3: 7 | 0% Низкий | 13 дней назад | |
CVE-2025-32023 Redis is an open source, in-memory database that persists on disk. Fro ... | CVSS3: 7 | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу