VYPR

rpm package

opensuse/valkey&distro=openSUSE Leap 15.6

pkg:rpm/opensuse/valkey&distro=openSUSE%20Leap%2015.6

Vulnerabilities (11)

  • CVE-2026-21863Feb 23, 2026
    affected < 8.0.7-150600.13.20.1fixed 8.0.7-150600.13.20.1

    Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus

  • CVE-2025-67733Feb 23, 2026
    affected < 8.0.7-150600.13.20.1fixed 8.0.7-150600.13.20.1

    Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other use

  • CVE-2025-49844Oct 3, 2025
    affected < 8.0.6-150600.13.17.1fixed 8.0.6-150600.13.17.1

    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem e

  • CVE-2025-46819Oct 3, 2025
    affected < 8.0.6-150600.13.17.1fixed 8.0.6-150600.13.17.1

    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redi

  • CVE-2025-46818Oct 3, 2025
    affected < 8.0.6-150600.13.17.1fixed 8.0.6-150600.13.17.1

    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists

  • CVE-2025-46817Oct 3, 2025
    affected < 8.0.6-150600.13.17.1fixed 8.0.6-150600.13.17.1

    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis wit

  • CVE-2025-48367Jul 7, 2025
    affected < 8.0.2-150600.13.14.1fixed 8.0.2-150600.13.14.1

    Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.

  • CVE-2025-32023Jul 7, 2025
    affected < 8.0.2-150600.13.14.1fixed 8.0.2-150600.13.14.1

    Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote co

  • CVE-2025-49112LowJun 2, 2025
    affected < 8.0.2-150600.13.11.1fixed 8.0.2-150600.13.11.1

    setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.

  • CVE-2025-27151May 29, 2025
    affected < 8.0.2-150600.13.11.1fixed 8.0.2-150600.13.11.1

    Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stac

  • CVE-2025-21605Apr 23, 2025
    affected < 8.0.2-150600.13.6.1fixed 8.0.2-150600.13.6.1

    Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does no