redis was added to epel7 repo on 2014-06-21
Page updated: 2024-04-20 21:14
Repo Status -
Overall Status
Source NVR: redis-3.2.12-2.el7 (2018-11-11)
redis | redis-3.2.12-2.el7 |
redis-trib | redis-trib-3.2.12-2.el7 |
1598568 | NEW | redis 4.0.9. |
1732830 | NEW | Request - Shutdown Save |
1932636 | NEW | CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms [epel-all] |
1948769 | NEW | CVE-2021-3470 redis: potential heap overflow when using a heap allocator other than jemalloc or glibc's malloc [epel-all] |
1957412 | NEW | CVE-2021-29477 redis: Integer overflow via STRALGO LCS command [epel-7] |
1957416 | NEW | CVE-2021-29478 redis: Integer overflow via COPY command for large intsets [epel-7] |
2012198 | NEW | CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser [epel-7] |
2012205 | NEW | CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request [epel-7] |
2012208 | NEW | CVE-2021-32762 redis: Integer overflow in redis-cli, redis-sentinel on some platforms [epel-7] |
2012211 | NEW | CVE-2021-32687 redis: Integer overflow issue with intsets [epel-7] |
2012214 | NEW | CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure [epel-7] |
2012217 | NEW | CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack [epel-7] |
2012219 | NEW | CVE-2021-41099 redis: Integer overflow issue with strings [epel-7] |
2061344 | NEW | Update to 3.2.13 |
2080288 | NEW | CVE-2022-24735 redis: Code injection via Lua script execution environment [epel-7] |
2080291 | NEW | CVE-2022-24736 redis: Malformed Lua script can crash Redis [epel-7] |
2163189 | NEW | CVE-2022-35977 redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic [epel-7] |
2174646 | NEW | CVE-2022-36021 redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow [epel-7] |
2174652 | NEW | CVE-2023-25155 redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack [epel-7] |
2187526 | NEW | CVE-2023-28856 redis: Insufficient validation of HINCRBYFLOAT command [epel-7] |
2238561 | NEW | CVE-2023-41053 redis: Redis SORT_RO may bypass ACL configuration [epel-7] |