redis-devel vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the redis-devel package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • M
Integer Overflow or Wraparound

*
  • H
Integer Overflow or Wraparound

<0:6.2.20-1.module+el8.10.0+23551+d4cd15d7
  • H
Arbitrary Code Injection

<0:6.2.20-1.module+el8.10.0+23551+d4cd15d7
  • H
Use After Free

<0:6.2.20-1.module+el8.10.0+23551+d4cd15d7
  • M
Time-of-check Time-of-use (TOCTOU)

*
  • H
Allocation of Resources Without Limits or Throttling

<0:6.2.19-1.module+el8.10.0+23330+19e91c41
  • H
Integer Overflow to Buffer Overflow

<0:6.2.19-1.module+el8.10.0+23330+19e91c41
  • H
Allocation of Resources Without Limits or Throttling

<0:6.2.18-1.module+el8.10.0+23050+05ea4e95
  • H
Use After Free

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Stack-based Buffer Overflow

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Uncontrolled Recursion

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • M
Improper Input Validation

*
  • H
Improper Privilege Management

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • L
Improper Privilege Management

*
  • M
Reachable Assertion

*
  • H
Integer Overflow to Buffer Overflow

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • M
Resource Exhaustion

*
  • H
Improper Input Validation

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Integer Overflow or Wraparound

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Integer Overflow or Wraparound

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • H
Integer Overflow or Wraparound

<0:6.2.17-1.module+el8.10.0+22680+748527fd
  • M
Integer Overflow or Wraparound

*
  • L
Improper Resource Shutdown or Release

*
  • L
Arbitrary Code Injection

<0:6.2.7-1.module+el8.7.0+15197+cc495aeb
  • L
NULL Pointer Dereference

<0:6.2.7-1.module+el8.7.0+15197+cc495aeb
  • L
Out-of-bounds Read

*
  • H
Allocation of Resources Without Limits or Throttling

<0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa
  • H
Integer Overflow or Wraparound

<0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa
  • H
Integer Overflow or Wraparound

<0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa
  • H
Out-of-bounds Write

<0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa
  • H
Integer Overflow or Wraparound

<0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa
  • H
Integer Overflow or Wraparound

<0:6.0.9-5.module+el8.4.0+12929+1bb0d2aa
  • H
Integer Overflow or Wraparound

<0:6.0.9-3.module+el8.4.0+10984+ed187465
  • H
Stack-based Buffer Overflow

<0:5.0.3-2.module+el8.0.0.z+3657+acb471dc
  • H
Heap-based Buffer Overflow

<0:5.0.3-2.module+el8.0.0.z+3657+acb471dc
  • M
Integer Overflow or Wraparound

*