VYPR

Bitnami package

valkey

pkg:bitnami/valkey

Vulnerabilities (48)

  • CVE-2024-31227Oct 7, 2024
    affected < 7.2.7fixed 7.2.7

    Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6

  • CVE-2023-41056Jan 10, 2024
    affected >= 7.0.9, < 7.0.15fixed 7.0.15

    Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4.

  • CVE-2023-45145Oct 18, 2023
    affected >= 2.6.0, < 6.2.14fixed 6.2.14

    Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of ti

  • CVE-2023-41053Sep 6, 2023
    affected >= 7.0.0, < 7.0.13fixed 7.0.13

    Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or

  • CVE-2021-31294Jul 15, 2023
    affected < 6.2.0fixed 6.2.0

    Redis before 6cbea7d allows a replica to cause an assertion failure in a primary server by sending a non-administrative command (specifically, a SET command). NOTE: this was fixed for Redis 6.2.x and 7.x in 2021. Versions before 6.2 were not intended to have safety guarantees rel

  • CVE-2022-24834Jul 13, 2023
    affected >= 2.6.0, < 6.0.20fixed 6.0.20

    Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua sc

  • CVE-2023-36824Jul 11, 2023
    affected >= 7.0.0, < 7.0.12fixed 7.0.12

    Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execut

  • CVE-2023-31655May 18, 2023
    affected >= 7.0.10, < 7.0.11fixed 7.0.11

    redis v7.0.10 was discovered to contain a segmentation violation. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors.

  • CVE-2023-28856Apr 18, 2023
    affected < 6.0.19fixed 6.0.19

    Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19.

  • CVE-2023-28425Mar 20, 2023
    affected >= 7.0.8, < 7.0.10fixed 7.0.10

    Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.

  • CVE-2023-25155Mar 2, 2023
    affected < 6.0.18fixed 6.0.18

    Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem

  • CVE-2022-36021Mar 1, 2023
    affected < 6.0.18fixed 6.0.18

    Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed i

  • CVE-2022-35977Jan 20, 2023
    affected >= 6.0.0, < 6.0.17fixed 6.0.17

    Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM)

  • CVE-2023-22458Jan 20, 2023
    affected >= 6.2.0, < 6.2.9fixed 6.2.9

    Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newe

  • CVE-2022-3647Oct 21, 2022
    affected < 6.2.8fixed 6.2.8

    ** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather

  • CVE-2022-35951Sep 23, 2022
    affected >= 7.0.0, < 7.0.5fixed 7.0.5

    Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a

  • CVE-2022-31144Jul 19, 2022
    affected >= 7.0.0, < 7.0.4fixed 7.0.4

    Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is re

  • CVE-2022-33105Jun 22, 2022
    affected >= 7.0.0, < 7.0.1fixed 7.0.1

    Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.

  • CVE-2022-24736Apr 27, 2022
    affected < 6.2.7fixed 6.2.7

    Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis vers

  • CVE-2022-24735Apr 27, 2022
    affected < 6.2.7fixed 6.2.7

    Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis