top | item 45501099

Redis CVE-2025-49844: Use-After-Free may lead to remote code execution

20 points| khaled_ismaeel | 4 months ago |redis.io

13 comments

order

jacquesm|4 months ago

This was here already earlier today:

https://news.ycombinator.com/item?id=45497027

Also: "As part of an ongoing effort by Redis and the Redis community to maintain Redis’ safety, security, and compliance posture, a security vulnerability in Redis has been identified and remediated in the versions indicated below." seems to be a bit strange given that this wasn't an effort led by Redis?

NicolaiS|4 months ago

Note that this requires an authenticated user, so most redis installations are not directly at risk.

The github issue has these workarounds: > An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

I guess most people doesn't use the lua engine, so this is probably a good advice to disable even if upgrading to a non-vuln version of Redis.

alserio|4 months ago

I'd like to see stats about that. Lua scripts in Redis are one of its most useful feature

DarkNova6|4 months ago

And this is why we need memory safety languages.

jacquesm|4 months ago

Your last three comments are more or less exactly the same thing.

jijji|4 months ago

most people use redis on localhost (i hope)

johnbellone|4 months ago

I’d imagine recent uptick in using services like Upstash may make it harder for people to know if they are vulnerable or not. Is this mitigated by disabling Lua script execution?

benmmurphy|4 months ago

it used to possible to execute redis commands against localhost from the web browser using domain rebinding. but i think redis did something to the protocol to fix this. also, this is only really relevant for developers.