A vulnerability was found in Redis up to 5.0.13/6.0.15/6.2.5. It has been classified as critical. Affected is an unknown functionality of the component Lua Stack. Upgrading to version 5.0.14, 6.0.16 or 6.2.6 eliminates this vulnerability. Applying the patch 666ed7facf4524bf6d19b11b20faa2cf93fdf591 is able to eliminate this problem. The bugfix is ready for download at github.com. The best possible mitigation is suggested to be upgrading to the latest version.
Redis up to 5.0.13/6.0.15/6.2.5 Lua Stack out-of-bounds write
- Virtual Patching
- October 5, 2021
- 7:05 am
CVE-2024-31869 : APACHE AIRFLOW UP TO 2.8.4 CONFIGURATION UI PAGE INFORMATION DISCLOSURE
Description Airflow versions 2.7.0 through 2.8.4 have a vulnerability that allows an authenticated user to see sensitive provider configuration via
CVE-2024-24856 : LINUX KERNEL UP TO 6.8 ACPI_ALLOCATE_ZEROED NULL POINTER DEREFERENCE
Description The memory allocation function ACPI_ALLOCATE_ZEROED does not guarantee a successful allocation, but the subsequent code directly dereferences the pointer
CVE-2024-2912 : BENTOML FRAMEWORK UP TO 1.2.4 POST REQUEST INSECURE DEFAULT INITIALIZATION OF RESOURCE
Description An insecure deserialization vulnerability exists in the BentoML framework, allowing remote code execution (RCE) by sending a specially crafted