We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
Reserved 2025-02-19 | Published 2025-05-29 | Updated 2025-05-29 | Assigner GitHub_MCWE-20: Improper Input Validation
CWE-121: Stack-based Buffer Overflow
github.com/.../redis/security/advisories/GHSA-5453-q98w-cmvm
github.com/...ommit/643b5db235cb82508e72f11c7b4bbfc7dc39be56
github.com/redis/redis/releases/tag/8.0.2
Support options