Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3885-1 | redis security update |
EUVD |
EUVD-2023-29130 | Redis is an in-memory database that persists on disk. Authenticated users issuing specially crafted `SRANDMEMBER`, `ZRANDMEMBER`, and `HRANDFIELD` commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. This problem affects all Redis versions. Patches were released in Redis version(s) 6.0.18, 6.2.11 and 7.0.9. |
Ubuntu USN |
USN-6531-1 | Redis vulnerabilities |
Fri, 07 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-03-07T18:30:41.461Z
Reserved: 2023-02-03T16:59:18.242Z
Link: CVE-2023-25155
Updated: 2024-08-02T11:18:36.023Z
Status : Modified
Published: 2023-03-02T04:15:10.807
Modified: 2024-11-21T07:49:12.907
Link: CVE-2023-25155
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN