Debian Redis vulnerabilities
68 known vulnerabilities affecting debian/redis.
Total CVEs
68
CISA KEV
1
actively exploited
Public exploits
9
Exploited in wild
1
Severity breakdown
CRITICAL6HIGH30MEDIUM17LOW15
Vulnerabilities
Page 2 of 4
CVE-2023-25155MEDIUMCVSS 5.5fixed in redis 5:7.0.9-1 (bookworm)2023
CVE-2023-25155 [MEDIUM] CVE-2023-25155: redis - Redis is an in-memory database that persists on disk. Authenticated users issuin...
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and
debian
CVE-2023-28425MEDIUMCVSS 5.5fixed in redis 5:7.0.10-1 (bookworm)2023
CVE-2023-28425 [MEDIUM] CVE-2023-28425: redis - Redis is an in-memory database that persists on disk. Starting in version 7.0.8 ...
Redis is an in-memory database that persists on disk. Starting in version 7.0.8 and prior to version 7.0.10, authenticated users can use the MSETNX command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in Redis version 7.0.10.
Scope: local
bookworm: resolved (fixed in 5:7.0.10-1)
bullseye: resolved
forky: resolved (
debian
CVE-2023-28856MEDIUMCVSS 5.5fixed in redis 5:7.0.11-1 (bookworm)2023
CVE-2023-28856 [MEDIUM] CVE-2023-28856: redis - Redis is an open source, in-memory database that persists on disk. Authenticated...
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
Scope: loc
debian
CVE-2023-22458MEDIUMCVSS 5.5fixed in redis 5:7.0.8-1 (bookworm)2023
CVE-2023-22458 [MEDIUM] CVE-2023-22458: redis - Redis is an in-memory database that persists on disk. Authenticated users can is...
Redis is an in-memory database that persists on disk. Authenticated users can issue a `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial-of-service by crashing Redis with an assertion failure. This problem affects Redis versions 6.2 or newer up to but not including 6.2.9 as well as versions 7.0 up to but not including 7.0.8. U
debian
CVE-2023-45145LOWCVSS 3.6fixed in redis 5:7.0.15-1~deb12u1 (bookworm)2023
CVE-2023-45145 [LOW] CVE-2023-45145: redis - Redis is an in-memory database that persists on disk. On startup, Redis begins l...
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has exi
debian
CVE-2023-41053LOWCVSS 3.3fixed in redis 5:7.0.15-1~deb12u1 (bookworm)2023
CVE-2023-41053 [LOW] CVE-2023-41053: redis - Redis is an in-memory database that persists on disk. Redis does not correctly i...
Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There ar
debian
CVE-2022-0543CRITICALCVSS 10.0KEVPoCvn/a2022-02-18
CVE-2022-0543 [CRITICAL] CWE-862 CVE-2022-0543: It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone t
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could result in remote code execution.
nvddebian
CVE-2022-31144HIGHCVSS 7.0fixed in redis 5:7.0.4-1 (bookworm)2022
CVE-2022-31144 [HIGH] CVE-2022-31144: redis - Redis is an in-memory database that persists on disk. A specially crafted `XAUTO...
Redis is an in-memory database that persists on disk. A specially crafted `XAUTOCLAIM` command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. This problem affects versions on the 7.x branch prior to 7.0.4. The patch is released in version 7.0.4.
Scope: local
bookworm: resolved (fixed in 5:7.0.4-1)
bullseye: re
debian
CVE-2022-24834HIGHCVSS 7.0fixed in redis 5:7.0.15-1~deb12u1 (bookworm)2022
CVE-2022-24834 [HIGH] CVE-2022-24834: redis - Redis is an in-memory database that persists on disk. A specially crafted Lua sc...
Redis is an in-memory database that persists on disk. A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson library, and result with heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. T
debian
CVE-2022-35951HIGHCVSS 7.0fixed in redis 5:7.0.5-1 (bookworm)2022
CVE-2022-35951 [HIGH] CVE-2022-35951: redis - Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, ...
Redis is an in-memory database that persists on disk. Versions 7.0.0 and above, prior to 7.0.5 are vulnerable to an Integer Overflow. Executing an `XAUTOCLAIM` command on a stream key in a specific state, with a specially crafted `COUNT` argument may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. This has been pat
debian
CVE-2022-36021MEDIUMCVSS 5.5fixed in redis 5:7.0.9-1 (bookworm)2022
CVE-2022-36021 [MEDIUM] CVE-2022-36021: redis - Redis is an in-memory database that persists on disk. Authenticated users can us...
Redis is an in-memory database that persists on disk. Authenticated users can use string matching commands (like `SCAN` or `KEYS`) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. The problem is fixed in Redis versions 6.0.18, 6.2.11, 7.0.9.
Scope: local
bookworm: resolved (fixed in 5:7.0.
debian
CVE-2022-35977MEDIUMCVSS 5.5fixed in redis 5:7.0.8-1 (bookworm)2022
CVE-2022-35977 [MEDIUM] CVE-2022-35977: redis - Redis is an in-memory database that persists on disk. Authenticated users issuin...
Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SETRANGE` and `SORT(_RO)` commands can trigger an integer overflow, resulting with Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic. The problem is fixed in Redis versions 7.0.8, 6.2.9 and 6.0.17. Users are advised
debian
CVE-2022-24735LOWCVSS 3.9fixed in redis 5:7.0.1-4 (bookworm)2022
CVE-2022-24735 [LOW] CVE-2022-24735: redis - Redis is an in-memory database that persists on disk. By exploiting weaknesses i...
Redis is an in-memory database that persists on disk. By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis prior to version 7.0.0 or 6.2.7 can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. The Lua script execution environment in Redis provides some measures that prevent a
debian
CVE-2022-33105LOWCVSS 7.52022
CVE-2022-33105 [HIGH] CVE-2022-33105: redis - Redis v7.0 was discovered to contain a memory leak via the component streamGetEd...
Redis v7.0 was discovered to contain a memory leak via the component streamGetEdgeID.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2022-3647LOWCVSS 3.12022
CVE-2022-3647 [LOW] CVE-2022-3647: redis - ** DISPUTED ** A vulnerability, which was classified as problematic, was found i...
** DISPUTED ** A vulnerability, which was classified as problematic, was found in Redis up to 6.2.7/7.0.5. Affected is the function sigsegvHandler of the file debug.c of the component Crash Report. The manipulation leads to denial of service. The complexity of an attack is rather high. The exploitability is told to be difficult. The real existence of this vulnerability i
debian
CVE-2022-24736LOWCVSS 3.3fixed in redis 5:7.0.1-4 (bookworm)2022
CVE-2022-24736 [LOW] CVE-2022-24736: redis - Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 an...
Redis is an in-memory database that persists on disk. Prior to versions 6.2.7 and 7.0.0, an attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result with a crash of the redis-server process. The problem is fixed in Redis versions 7.0.0 and 6.2.7. An additional workaround to mitigate this problem without patching th
debian
CVE-2021-32625HIGHCVSS 7.5fixed in redis 5:6.0.14-1 (bookworm)2021
CVE-2021-32625 [HIGH] CVE-2021-32625: redis - Redis is an open source (BSD licensed), in-memory data structure store, used as ...
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer, could be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. The problem is fixe
debian
CVE-2021-32628HIGHCVSS 7.5fixed in redis 5:6.0.16-1 (bookworm)2021
CVE-2021-32628 [HIGH] CVE-2021-32628: redis - Redis is an open source, in-memory database that persists on disk. An integer ov...
Redis is an open source, in-memory database that persists on disk. An integer overflow bug in the ziplist data structure used by all versions of Redis can be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves modifying the default ziplist configuration parameters (hash-max-ziplist-entries, hash-max-ziplist-value
debian
CVE-2021-32761HIGHCVSS 7.5fixed in redis 5:6.0.15-1 (bookworm)2021
CVE-2021-32761 [HIGH] CVE-2021-32761: redis - Redis is an in-memory database that persists on disk. A vulnerability involving ...
Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary hea
debian
CVE-2021-29477HIGHCVSS 7.5fixed in redis 5:6.0.13-1 (bookworm)2021
CVE-2021-29477 [HIGH] CVE-2021-29477: redis - Redis is an open source (BSD licensed), in-memory data structure store, used as ...
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to corrupt the heap and potentially result with remote code execution. The problem is fixed in version 6.2.3 and 6.0.13. An additional workaround
debian