redis vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the redis package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Use After Free

*
  • L
Improper Input Validation

*
  • L
Stack-based Buffer Overflow

*
  • L
Uncontrolled Recursion

<5:6.0.16-1+deb11u4
  • L
Exposure of Resource to Wrong Sphere

<5:6.0.16-1+deb11u3
  • L
Reachable Assertion

*
  • H
Heap-based Buffer Overflow

<5:6.0.16-1+deb11u3
  • M
Reachable Assertion

<5:6.0.16-1+deb11u3
  • M
Algorithmic Complexity

<5:6.0.16-1+deb11u3
  • M
Integer Overflow or Wraparound

<5:6.0.16-1+deb11u3
  • M
Integer Overflow or Wraparound

<5:6.0.16-1+deb11u4
  • L
Improper Resource Shutdown or Release

*
  • L
Arbitrary Code Injection

*
  • L
NULL Pointer Dereference

*
  • C
Missing Authorization

<5:6.0.16-1+deb11u2
  • H
Allocation of Resources Without Limits or Throttling

<5:6.0.16-1+deb11u1
  • M
Out-of-bounds Read

<5:6.0.16-1+deb11u1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1+deb11u1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1+deb11u1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1+deb11u1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1+deb11u1
  • H
Out-of-bounds Write

<5:6.0.16-1+deb11u1
  • H
Integer Overflow or Wraparound

<5:6.0.16-1+deb11u1
  • L
CVE-2020-21468

*
  • H
Out-of-bounds Read

<5:6.0.15-1
  • H
Buffer Overflow

<5:6.0.14-1
  • H
Integer Overflow or Wraparound

<5:6.0.13-1
  • H
Integer Overflow or Wraparound

<5:6.0.13-1
  • L
Out-of-bounds Write

<5:6.0.9-1
  • H
Integer Overflow or Wraparound

<5:6.0.11-1
  • H
Out-of-bounds Write

<5:6.0.0-1
  • M
Improper Input Validation

<2:2.6.7-1
  • H
Out-of-Bounds

<5:5.0.4-1
  • H
Out-of-Bounds

<5:5.0.4-1
  • L
Improper Input Validation

<2:2.6.0-1
  • M
Access Restriction Bypass

<3:3.2.5-2
  • C
Integer Overflow or Wraparound

<5:4.0.10-1
  • C
Out-of-bounds Write

<5:4.0.10-1
  • H
Out-of-Bounds

<5:4.0.10-1
  • H
Security Features

<3:3.2.7-1
  • L
Out-of-Bounds

<4:4.0.2-5
  • C
Out-of-Bounds

<3:3.2.4-1
  • L
Information Exposure

<2:3.2.1-4
  • H
Numeric Errors

<2:3.0.5-4
  • C
Code

<2:3.0.2-1