Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

41 – 50 of 62 results


CVE-2021-29477

Medium priority
Ignored

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. An integer overflow bug in Redis version 6.0 or newer could be exploited using the `STRALGO LCS` command to...

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Not affected Not affected Not affected Not affected
Show less packages

CVE-2021-29469

Medium priority
Needs evaluation

Node-redis is a Node.js Redis client. Before version 3.1.1, when a client is in monitoring mode, the regex begin used to detected monitor messages could cause exponential backtracking on some strings. This issue could lead to a...

1 affected packages

node-redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
node-redis Not affected Needs evaluation Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-3470

Negligible priority
Needs evaluation

A heap overflow issue was found in Redis in versions before 5.0.10, before 6.0.9 and before 6.2.0 when using a heap allocator other than jemalloc or glibc's malloc, leading to potential out of bound write or process...

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Not affected Not affected Needs evaluation Needs evaluation Needs evaluation
Show less packages

CVE-2021-21309

Medium priority

Some fixes available 2 of 3

Redis is an open-source, in-memory database that persists on disk. In affected versions of Redis an integer overflow bug in 32-bit Redis version 4.0 or newer could be exploited to corrupt the heap and potentially result with...

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Not affected Not affected Fixed Not affected
Show less packages

CVE-2020-14147

Medium priority
Vulnerable

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application...

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Not affected Not affected Vulnerable Not affected Not affected
Show less packages

CVE-2020-7105

Medium priority

Some fixes available 1 of 5

async.c and dict.c in libhiredis.a in hiredis through 0.14.0 allow a NULL pointer dereference because malloc return values are unchecked.

1 affected packages

hiredis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
hiredis Not affected Not affected Not affected Vulnerable Vulnerable
Show less packages

CVE-2013-0180

Low priority
Ignored

Insecure temporary file vulnerability in Redis 2.6 related to /tmp/redis.ds.

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Not affected
Show less packages

CVE-2013-0178

Low priority
Ignored

Insecure temporary file vulnerability in Redis before 2.6 related to /tmp/redis-%p.vm.

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Not affected Not affected
Show less packages

CVE-2019-10193

Medium priority
Fixed

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could...

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Not affected Not affected
Show less packages

CVE-2019-10192

Medium priority

Some fixes available 3 of 4

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command,...

1 affected packages

redis

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
redis Fixed Fixed
Show less packages