Debian Redis vulnerabilities

68 known vulnerabilities affecting debian/redis.

Total CVEs
68
CISA KEV
1
actively exploited
Public exploits
9
Exploited in wild
1
Severity breakdown
CRITICAL6HIGH30MEDIUM17LOW15

Vulnerabilities

Page 1 of 4
CVE-2026-21863HIGHCVSS 7.5fixed in valkey 8.1.4+dfsg1-2 (forky)2026
CVE-2026-21863 [HIGH] CVE-2026-21863: redict - Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.... Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is loca
debian
CVE-2025-49844CRITICALCVSS 9.9PoCfixed in redict 7.3.6+ds-1 (forky)2025
CVE-2025-49844 [CRITICAL] CVE-2025-49844: redict - Redis is an open source, in-memory database that persists on disk. Versions 8.2.... Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2
debian
CVE-2025-32023HIGHCVSS 7.0PoCfixed in redict 7.3.5+ds-1 (forky)2025
CVE-2025-32023 [HIGH] CVE-2025-32023: redict - Redis is an open source, in-memory database that persists on disk. From 2.8 to b... Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use a specially crafted string to trigger a stack/heap out of bounds write on hyperloglog operations, potentially leading to remote code execution. The bug likely affects all Redis versions with hyperloglog operations imple
debian
CVE-2025-21605HIGHCVSS 7.5fixed in redict 7.3.5+ds-1 (forky)2025
CVE-2025-21605 [HIGH] CVE-2025-21605: redict - Redis is an open source, in-memory database that persists on disk. In versions s... Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore,
debian
CVE-2025-67733HIGHCVSS 8.5fixed in valkey 8.1.4+dfsg1-2 (forky)2025
CVE-2025-67733 [HIGH] CVE-2025-67733: redict - Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.... Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly hand
debian
CVE-2025-48367HIGHCVSS 7.5fixed in redict 7.3.5+ds-1 (forky)2025
CVE-2025-48367 [HIGH] CVE-2025-48367: redict - Redis is an open source, in-memory database that persists on disk. An unauthenti... Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. Scope: local forky: resolved (fixed in 7.3.5+ds-1) sid: resolved (fixed in 7.3.5+ds-1)
debian
CVE-2025-46817HIGHCVSS 7.0PoCfixed in redict 7.3.6+ds-1 (forky)2025
CVE-2025-46817 [HIGH] CVE-2025-46817: redict - Redis is an open source, in-memory database that persists on disk. Versions 8.2.... Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. Scope: local forky: resolved (fixe
debian
CVE-2025-27151MEDIUMCVSS 4.7fixed in redict 7.3.5+ds-1 (forky)2025
CVE-2025-27151 [MEDIUM] CVE-2025-27151: redict - Redis is an open source, in-memory database that persists on disk. In versions s... Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code ex
debian
CVE-2025-46818MEDIUMCVSS 6.0PoCfixed in redict 7.3.6+ds-1 (forky)2025
CVE-2025-46818 [MEDIUM] CVE-2025-46818: redict - Redis is an open source, in-memory database that persists on disk. Versions 8.2.... Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A wo
debian
CVE-2025-46819MEDIUMCVSS 6.3PoCfixed in redict 7.3.6+ds-1 (forky)2025
CVE-2025-46819 [MEDIUM] CVE-2025-46819: redict - Redis is an open source, in-memory database that persists on disk. Versions 8.2.... Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue wi
debian
CVE-2025-62507LOWCVSS 7.72025
CVE-2025-62507 [HIGH] CVE-2025-62507: redis - Redis is an open source, in-memory database that persists on disk. In versions 8... Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users fr
debian
CVE-2025-49112LOWCVSS 3.1fixed in redict 7.3.5+ds-1 (forky)2025
CVE-2025-49112 [LOW] CVE-2025-49112: redict - setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflo... setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. Scope: local forky: resolved (fixed in 7.3.5+ds-1) sid: resolved (fixed in 7.3.5+ds-1)
debian
CVE-2025-46686LOWCVSS 3.52025
CVE-2025-46686 [LOW] CVE-2025-46686: redis - Redis through 8.0.3 allows memory consumption via a multi-bulk command composed ... Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol
debian
CVE-2024-46981HIGHCVSS 7.0fixed in redict 7.3.2+ds-1 (forky)2024
CVE-2024-46981 [HIGH] CVE-2024-46981: redict - Redis is an open source, in-memory database that persists on disk. An authentica... Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent
debian
CVE-2024-31449HIGHCVSS 7.0fixed in redict 7.3.1+ds-1 (forky)2024
CVE-2024-31449 [HIGH] CVE-2024-31449: redict - Redis is an open source, in-memory database that persists on disk. An authentica... Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.
debian
CVE-2024-51741MEDIUMCVSS 4.4fixed in redict 7.3.2+ds-1 (forky)2024
CVE-2024-51741 [MEDIUM] CVE-2024-51741: redict - Redis is an open source, in-memory database that persists on disk. An authentica... Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2. Scope: local forky: resolved (fixed in 7.3.2+ds-1) sid: resolved (fixed in 7.3.2+ds-1)
debian
CVE-2024-31228MEDIUMCVSS 5.5fixed in redict 7.3.1+ds-1 (forky)2024
CVE-2024-31228 [MEDIUM] CVE-2024-31228: redict - Redis is an open source, in-memory database that persists on disk. Authenticated... Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading t
debian
CVE-2024-31227MEDIUMCVSS 4.4fixed in redict 7.3.1+ds-1 (forky)2024
CVE-2024-31227 [MEDIUM] CVE-2024-31227: redict - Redis is an open source, in-memory database that persists on disk. An authentica... Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulne
debian
CVE-2023-36824HIGHCVSS 7.4fixed in redis 5:7.0.15-1~deb12u1 (bookworm)2023
CVE-2023-36824 [HIGH] CVE-2023-36824: redis - Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.... Redis is an in-memory database that persists on disk. In Redit 7.0 prior to 7.0.12, extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption and potentially remote code execution. Several scenarios that may lead to authenticated users executing a specially crafted
debian
CVE-2023-41056HIGHCVSS 8.1fixed in redis 5:7.0.15-1~deb12u1 (bookworm)2023
CVE-2023-41056 [HIGH] CVE-2023-41056: redis - Redis is an in-memory database that persists on disk. Redis incorrectly handles ... Redis is an in-memory database that persists on disk. Redis incorrectly handles resizing of memory buffers which can result in integer overflow that leads to heap overflow and potential remote code execution. This issue has been patched in version 7.0.15 and 7.2.4. Scope: local bookworm: resolved (fixed in 5:7.0.15-1~deb12u1) bullseye: resolved forky: resolved (fixed
debian