Количество 32
Количество 32

SUSE-SU-2025:02681-1
Security update for redis

SUSE-SU-2025:02679-1
Security update for redis
ELSA-2025-12008
ELSA-2025-12008: redis:7 security update (IMPORTANT)
ELSA-2025-11401
ELSA-2025-11401: valkey security update (IMPORTANT)

SUSE-SU-2025:02680-1
Security update for redis

SUSE-SU-2025:02594-1
Security update for valkey

SUSE-SU-2025:02593-1
Security update for valkey

SUSE-SU-2025:02579-1
Security update for redis
ELSA-2025-12006
ELSA-2025-12006: redis:6 security update (IMPORTANT)
ELSA-2025-11453
ELSA-2025-11453: redis security update (IMPORTANT)

CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

CVE-2025-48367
CVE-2025-48367
Redis is an open source, in-memory database that persists on disk. An ...

BDU:2025-09081
Уязвимость сервера системы управления базами данных (СУБД) Redis, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2025-27151
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.

CVE-2025-27151
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.

CVE-2025-27151
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.

CVE-2025-27151
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2025:02681-1 Security update for redis | 6 дней назад | ||
![]() | SUSE-SU-2025:02679-1 Security update for redis | 6 дней назад | ||
ELSA-2025-12008 ELSA-2025-12008: redis:7 security update (IMPORTANT) | 12 дней назад | |||
ELSA-2025-11401 ELSA-2025-11401: valkey security update (IMPORTANT) | 21 день назад | |||
![]() | SUSE-SU-2025:02680-1 Security update for redis | 6 дней назад | ||
![]() | SUSE-SU-2025:02594-1 Security update for valkey | 9 дней назад | ||
![]() | SUSE-SU-2025:02593-1 Security update for valkey | 9 дней назад | ||
![]() | SUSE-SU-2025:02579-1 Security update for redis | 10 дней назад | ||
ELSA-2025-12006 ELSA-2025-12006: redis:6 security update (IMPORTANT) | 13 дней назад | |||
ELSA-2025-11453 ELSA-2025-11453: redis security update (IMPORTANT) | 20 дней назад | |||
![]() | CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. | CVSS3: 5.3 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад |
![]() | CVSS3: 7.5 | 0% Низкий | 13 дней назад | |
CVE-2025-48367 Redis is an open source, in-memory database that persists on disk. An ... | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад | |
![]() | BDU:2025-09081 Уязвимость сервера системы управления базами данных (СУБД) Redis, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.5 | 0% Низкий | около 1 месяца назад |
![]() | CVE-2025-27151 Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | CVSS3: 4.7 | 0% Низкий | 2 месяца назад |
![]() | CVE-2025-27151 Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | CVSS3: 2.5 | 0% Низкий | 2 месяца назад |
![]() | CVE-2025-27151 Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | CVSS3: 4.7 | 0% Низкий | 2 месяца назад |
![]() | CVSS3: 4.7 | 0% Низкий | около 1 месяца назад |
Уязвимостей на страницу