Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5969-1 | redis security update |
EUVD |
EUVD-2025-16375 | Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. |
Thu, 21 Aug 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* |
Fri, 30 May 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 29 May 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 May 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2. | |
| Title | redis-check-aof may lead to stack overflow and potential RCE | |
| Weaknesses | CWE-121 CWE-20 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-29T13:43:09.725Z
Reserved: 2025-02-19T16:30:47.779Z
Link: CVE-2025-27151
Updated: 2025-05-29T13:42:57.703Z
Status : Analyzed
Published: 2025-05-29T09:15:25.980
Modified: 2025-12-23T15:03:51.993
Link: CVE-2025-27151
OpenCVE Enrichment
Updated: 2025-07-12T15:26:10Z
Debian DSA
EUVD