PT-2026-37085 · Redis · Redis-Server
Xint Code
·
Published
2026-05-05
·
Updated
2026-05-05
·
CVE-2026-23479
CVSS v4.0
7.7
High
| Vector | AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N |
Name of the Vulnerable Software and Affected Versions
redis-server versions 7.2.0 through 8.6.2
Description
An issue exists in the unblock client flow where an error return from the
processCommandAndResetClient() function is not properly handled when re-executing a blocked command. If a blocked client is evicted during this process, an authenticated attacker can trigger a use-after-free condition, which may lead to remote code execution. Use-after-free is a memory corruption flaw that occurs when an application continues to use a pointer after it has been freed.Recommendations
Update to version 8.6.3.
Fix
Use After Free
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Redis-Server