Database Redis: Vulnerability allows execution of malicious code
heise.deΒ·9h
Flag this post

The developers of the in-memory database Redis have closed a security vulnerability that allows attackers to execute arbitrary malicious code.

In the GitHub repository of Redis finds a vulnerability entry, which discusses the security vulnerability. According to the entry, users can call the XACKDEL command with multiple IDs, thereby triggering a stack-based buffer overflow. This, in turn, can lead to the execution of previously injected code (CVE-2025-62507, CVSS between 7.7 and 9.8, risk β€œhigh” to β€œcritical”). The problem lies in the fact that the Redis code does not catch the case where the number of IDs exceeds STREAMID_STATIC_VECTOR_LEN. This causes it to skip a reallocation, which u…

Similar Posts

Loading similar posts...