VYPR

Bitnami package

redis

pkg:bitnami/redis

Vulnerabilities (50)

  • CVE-2022-24735Apr 27, 2022
    affected < 6.2.7fixed 6.2.7

    Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis

  • CVE-2022-0543KEVFeb 18, 2022

    It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.

  • CVE-2021-41099Oct 4, 2021
    affected >= 5.0.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution. The vulnerability involves changing the default prot

  • CVE-2021-32762Oct 4, 2021
    affected >= 5.0.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. The redis-cli command line tool and redis-sentinel service may be vulnerable to integer overflow when parsing specially crafted large multi-bulk network replies. This is a result of a vulnerability in the underlyi

  • CVE-2021-32687Oct 4, 2021
    affected >= 5.0.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. An integer overflow bug affecting all versions of Redis can be exploited to corrupt the heap and potentially be used to leak arbitrary contents of the heap or trigger remote code execution. The vulnerability invol

  • CVE-2021-32675Oct 4, 2021
    affected >= 5.0.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element

  • CVE-2021-32672Oct 4, 2021
    affected >= 3.2.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging sup

  • CVE-2021-32627Oct 4, 2021
    affected >= 5.0.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. In affected versions an integer overflow bug in Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default proto-max-bulk-len and

  • CVE-2021-32628Oct 4, 2021
    affected >= 5.0.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves modifying the

  • CVE-2021-32626Oct 4, 2021
    affected >= 2.6.0, < 5.0.14fixed 5.0.14

    Redis is an open source, in-memory database that persists on disk. In affected versions specially crafted Lua scripts executing in Redis can cause the heap-based Lua stack to be overflowed, due to incomplete checks for this condition. This can result with heap corruption and pote

Page 3 of 3