CVE-2025-27151

EUVD-2025-16375
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.7 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
redisredis
7.0.0 ≤
𝑥
< 7.2.9
redisredis
7.4.0 ≤
𝑥
< 7.4.4
redisredis
8.0.0 ≤
𝑥
< 8.0.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
redict
forky
7.3.6+ds-1
fixed
sid
7.3.6+ds-1
fixed
redis
bookworm
5:7.0.15-1~deb12u6
fixed
bookworm (security)
5:7.0.15-1~deb12u6
fixed
bullseye
5:6.0.16-1+deb11u2
fixed
bullseye (security)
5:6.0.16-1+deb11u8
fixed
forky
5:8.0.6-1
fixed
sid
5:8.0.6-1
fixed
trixie
5:8.0.2-3+deb13u1
fixed
trixie (security)
5:8.0.2-3+deb13u1
fixed
valkey
forky
8.1.4+dfsg1-2
fixed
sid
8.1.4+dfsg1-2
fixed
trixie
8.1.1+dfsg1-3+deb13u1
fixed
trixie (security)
8.1.1+dfsg1-3+deb13u2
fixed