redis-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the redis-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

<0:6.2.20-1.module+el8.10.0+23551+d4cd15d7
  • H
Arbitrary Code Injection

<0:6.2.20-1.module+el8.10.0+23551+d4cd15d7
  • H
Use After Free

<0:6.2.20-1.module+el8.10.0+23551+d4cd15d7
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Allocation of Resources Without Limits or Throttling

<0:6.2.19-1.module+el8.10.0+23330+19e91c41
  • H
Out-of-bounds Write

<0:6.2.19-1.module+el8.10.0+23330+19e91c41
  • H
Allocation of Resources Without Limits or Throttling

<0:6.2.18-1.module+el8.10.0+23050+05ea4e95
  • H
Use After Free

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Out-of-bounds Write

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Uncontrolled Recursion

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • M
Improper Input Validation

*
  • H
Improper Privilege Management

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • L
Improper Privilege Management

*
  • M
Reachable Assertion

*
  • H
Integer Overflow to Buffer Overflow

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Integer Overflow or Wraparound

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Integer Overflow or Wraparound

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Integer Overflow or Wraparound

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Integer Overflow or Wraparound

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • L
Improper Resource Shutdown or Release

*
  • L
Arbitrary Code Injection

<0:6.2.7-1.module+el8.7.0+15197+cc495aeb
  • L
NULL Pointer Dereference

<0:6.2.7-1.module+el8.7.0+15197+cc495aeb
  • L
Out-of-bounds Read

*
  • H
Allocation of Resources Without Limits or Throttling

<0:5.0.3-5.module+el8.4.0+12927+b9845322
  • H
Integer Overflow or Wraparound

<0:5.0.3-5.module+el8.4.0+12927+b9845322
  • H
Integer Overflow or Wraparound

<0:5.0.3-5.module+el8.4.0+12927+b9845322
  • H
Out-of-bounds Write

<0:5.0.3-5.module+el8.4.0+12927+b9845322
  • H
Out-of-bounds Write

<0:5.0.3-5.module+el8.4.0+12927+b9845322
  • H
Integer Overflow or Wraparound

<0:5.0.3-5.module+el8.4.0+12927+b9845322
  • H
Integer Overflow or Wraparound

<0:6.0.9-3.module+el8.4.0+10984+ed187465
  • H
Stack-based Buffer Overflow

<0:5.0.3-2.module+el8.0.0.z+3657+acb471dc
  • H
Heap-based Buffer Overflow

<0:5.0.3-2.module+el8.0.0.z+3657+acb471dc
  • M
Integer Overflow or Wraparound

*