Skip to content

Conversation

@KIMDONGYEON00
Copy link

@KIMDONGYEON00 KIMDONGYEON00 commented Oct 7, 2025

CVE-2025-29844

Redis versions 8.2.1 and below are vulnerable to remote code execution via a specially crafted Lua script that manipulates the garbage collector to trigger use-after-free.
Fixed in version 8.2.2. Workaround: Use ACL to restrict EVAL and EVALSHA commands.

CVE-2025-49844
Reference

CVE-2025-46819

Redis versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service.
CVE-2025-46819
Reference

CVE-2025-46817

Redis versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution
CVE-2025-46817
Reference

@KIMDONGYEON00 KIMDONGYEON00 changed the title Lua script may lead to remote code execution (CVE-2025-49844) Fix Lua remote code execution (CVE-2025-49844) Oct 7, 2025
LUA out-of-bound read (CVE-2025-46819)
@KIMDONGYEON00 KIMDONGYEON00 changed the title Fix Lua remote code execution (CVE-2025-49844) Fix Lua remote code execution (CVE-2025-49844, CVE-2025-46819) Oct 20, 2025
Fix Lua Library (CVE-2025-46817)
Fix Lua Library (CVE-2025-46817)
@KIMDONGYEON00 KIMDONGYEON00 changed the title Fix Lua remote code execution (CVE-2025-49844, CVE-2025-46819) Fix Lua remote code execution (CVE-2025-49844, CVE-2025-46819, CVE-2025-46817)) Oct 20, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants