rpm package
suse/redis&distro=SUSE Enterprise Storage 7.1
pkg:rpm/suse/redis&distro=SUSE%20Enterprise%20Storage%207.1
Vulnerabilities (16)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-49844 | — | < 6.0.14-150200.6.43.1 | 6.0.14-150200.6.43.1 | Oct 3, 2025 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem e | ||
| CVE-2025-46819 | — | < 6.0.14-150200.6.43.1 | 6.0.14-150200.6.43.1 | Oct 3, 2025 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redi | ||
| CVE-2025-46818 | — | < 6.0.14-150200.6.43.1 | 6.0.14-150200.6.43.1 | Oct 3, 2025 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists | ||
| CVE-2025-46817 | — | < 6.0.14-150200.6.43.1 | 6.0.14-150200.6.43.1 | Oct 3, 2025 | Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis wit | ||
| CVE-2025-48367 | — | < 6.0.14-150200.6.40.1 | 6.0.14-150200.6.40.1 | Jul 7, 2025 | Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. | ||
| CVE-2025-32023 | — | < 6.0.14-150200.6.40.1 | 6.0.14-150200.6.40.1 | Jul 7, 2025 | Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote co | ||
| CVE-2025-21605 | — | < 6.0.14-150200.6.35.1 | 6.0.14-150200.6.35.1 | Apr 23, 2025 | Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does no | ||
| CVE-2024-46981 | — | < 6.0.14-150200.6.32.1 | 6.0.14-150200.6.32.1 | Jan 6, 2025 | Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional worka | ||
| CVE-2024-31449 | — | < 6.0.14-150200.6.32.1 | 6.0.14-150200.6.32.1 | Oct 7, 2024 | Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis | ||
| CVE-2024-31228 | — | < 6.0.14-150200.6.32.1 | 6.0.14-150200.6.32.1 | Oct 7, 2024 | Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL defini | ||
| CVE-2023-45145 | — | < 6.0.14-150200.6.29.1 | 6.0.14-150200.6.29.1 | Oct 18, 2023 | Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of ti | ||
| CVE-2022-24834 | — | < 6.0.14-150200.6.26.1 | 6.0.14-150200.6.26.1 | Jul 13, 2023 | Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua sc | ||
| CVE-2023-28856 | — | < 6.0.14-150200.6.26.1 | 6.0.14-150200.6.26.1 | Apr 18, 2023 | Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. | ||
| CVE-2023-25155 | — | < 6.0.14-150200.6.20.1 | 6.0.14-150200.6.20.1 | Mar 2, 2023 | Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem | ||
| CVE-2022-36021 | — | < 6.0.14-150200.6.20.1 | 6.0.14-150200.6.20.1 | Mar 1, 2023 | Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed i | ||
| CVE-2022-35977 | — | < 6.0.14-150200.6.17.1 | 6.0.14-150200.6.17.1 | Jan 20, 2023 | Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) |
- CVE-2025-49844Oct 3, 2025affected < 6.0.14-150200.6.43.1fixed 6.0.14-150200.6.43.1
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem e
- CVE-2025-46819Oct 3, 2025affected < 6.0.14-150200.6.43.1fixed 6.0.14-150200.6.43.1
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redi
- CVE-2025-46818Oct 3, 2025affected < 6.0.14-150200.6.43.1fixed 6.0.14-150200.6.43.1
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists
- CVE-2025-46817Oct 3, 2025affected < 6.0.14-150200.6.43.1fixed 6.0.14-150200.6.43.1
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis wit
- CVE-2025-48367Jul 7, 2025affected < 6.0.14-150200.6.40.1fixed 6.0.14-150200.6.40.1
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.
- CVE-2025-32023Jul 7, 2025affected < 6.0.14-150200.6.40.1fixed 6.0.14-150200.6.40.1
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote co
- CVE-2025-21605Apr 23, 2025affected < 6.0.14-150200.6.35.1fixed 6.0.14-150200.6.35.1
Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does no
- CVE-2024-46981Jan 6, 2025affected < 6.0.14-150200.6.32.1fixed 6.0.14-150200.6.32.1
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional worka
- CVE-2024-31449Oct 7, 2024affected < 6.0.14-150200.6.32.1fixed 6.0.14-150200.6.32.1
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis
- CVE-2024-31228Oct 7, 2024affected < 6.0.14-150200.6.32.1fixed 6.0.14-150200.6.32.1
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL defini
- CVE-2023-45145Oct 18, 2023affected < 6.0.14-150200.6.29.1fixed 6.0.14-150200.6.29.1
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of ti
- CVE-2022-24834Jul 13, 2023affected < 6.0.14-150200.6.26.1fixed 6.0.14-150200.6.26.1
Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua sc
- CVE-2023-28856Apr 18, 2023affected < 6.0.14-150200.6.26.1fixed 6.0.14-150200.6.26.1
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19.
- CVE-2023-25155Mar 2, 2023affected < 6.0.14-150200.6.20.1fixed 6.0.14-150200.6.20.1
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem
- CVE-2022-36021Mar 1, 2023affected < 6.0.14-150200.6.20.1fixed 6.0.14-150200.6.20.1
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed i
- CVE-2022-35977Jan 20, 2023affected < 6.0.14-150200.6.17.1fixed 6.0.14-150200.6.17.1
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM)