CVE-2026-23479 - redis-server use-after-free in unblock client flow may allow remote code execution

CVE ID :CVE-2026-23479
Published : May 5, 2026, 5:17 p.m. | 1 hour, 37 minutes ago
Description :Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.
Severity: 7.7 | HIGH
Visit the link for more details, such as CVSS details, affected products, timeline, and more...

from Latest Vulnerabilities https://ift.tt/y40h953

Post a Comment

Previous Post Next Post