redis vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the redis package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

*
  • M
Improper Input Validation

*
  • M
Information Exposure

*
  • M
Information Exposure

*
  • M
Integer Overflow or Wraparound

<0:2.8.24-1.el7ost
  • H
Code

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

*
  • L
Incorrect Permission Assignment for Critical Resource

<0:3.0.6-2.el7ost
  • M
Arbitrary Argument Injection

*
  • M
Arbitrary Argument Injection

*
  • M
Arbitrary Argument Injection

*
  • M
Arbitrary Argument Injection

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Heap-based Buffer Overflow

*
  • L
Arbitrary Code Injection

*
  • L
NULL Pointer Dereference

*
  • L
Out-of-Bounds

*
  • L
Out-of-Bounds

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Stack-based Buffer Overflow

<0:3.2.8-3.el7ost
  • M
Stack-based Buffer Overflow

<0:3.0.6-4.el7ost
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • L
Stack-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

<0:3.0.6-4.el7ost
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

*
  • M
Heap-based Buffer Overflow

<0:3.2.8-3.el7ost
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

<0:3.2.8-3.el7ost
  • M
Integer Overflow or Wraparound

<0:3.0.6-4.el7ost
  • M
Integer Overflow or Wraparound

*
  • M
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • H
Allocation of Resources Without Limits or Throttling

<0:3.2.8-5.el7ost
  • H
Allocation of Resources Without Limits or Throttling

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Out-of-bounds Write

<0:3.2.8-5.el7ost
  • H
Out-of-bounds Write

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Integer Overflow or Wraparound

<0:3.2.8-5.el7ost
  • H
Heap-based Buffer Overflow

<0:3.2.8-4.el7ost
  • H
Heap-based Buffer Overflow

<0:3.2.8-4.el7ost
  • H
Heap-based Buffer Overflow

<0:3.0.6-5.el7ost
  • H
Heap-based Buffer Overflow

<0:3.0.6-5.el7ost