No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redis
Redis redis |
|
| Vendors & Products |
Redis
Redis redis |
Tue, 05 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3. | |
| Title | redis-server use-after-free in unblock client flow may allow remote code execution | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-05T17:13:15.203Z
Reserved: 2026-01-13T15:47:41.627Z
Link: CVE-2026-23479
Updated: 2026-05-05T17:13:12.197Z
Status : Awaiting Analysis
Published: 2026-05-05T17:17:02.577
Modified: 2026-05-05T19:38:32.193
Link: CVE-2026-23479
No data.
OpenCVE Enrichment
Updated: 2026-05-05T20:00:12Z