The developers of the in-memory database Redis have closed a security vulnerability that allows attackers to execute arbitrary malicious code.

In the GitHub repository of Redis finds a vulnerability entry, which discusses the security vulnerability. According to the entry, users can call the XACKDEL command with multiple IDs, thereby triggering a stack-based buffer overflow. This, in turn, can lead to the execution of previously injected code (CVE-2025-62507, CVSS between 7.7 and 9.8, risk “high” to “critical”). The problem lies in the fact that the Redis code does not catch the case where the number of IDs exceeds STREAMID_STATIC_VECTOR_LEN. This causes it to skip a reallocation, which u…

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help