CVE-2026-23479

Name
CVE-2026-23479
Description
Redis is an in-memory data structure store. In redis-server from 7.2.0 until 8.6.3, the unblock client flow does not handle an error return from `processCommandAndResetClient` when re-executing a blocked command. If a blocked client is evicted during this flow, an authenticated attacker can trigger a use-after-free that may lead to remote code execution. This has been patched in version 8.6.3.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
security-advisories@github.com https://github.com/redis/redis/releases/tag/8.6.3
security-advisories@github.com https://github.com/redis/redis/security/advisories/GHSA-93m2-935m-8rj3

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 7.2.0 < 8.6.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
valkey edge-main 9.0.4-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
valkey 3.23-main 9.0.4-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
valkey 3.22-main 8.1.7-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
valkey 3.21-main 7.2.13-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
valkey 3.20-main 7.2.13-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
redis edge-main 7.2.4-r1 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-main 7.2.4-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-main 7.2.3-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-main 7.2.2-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-main 7.2.1-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-main 7.2.0-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-community 8.6.2-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.6.1-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.6.0-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.4.1-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.4.0-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.2.3-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.2.2-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.2.1-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.2.0-r1 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis edge-community 8.2.0-r0 fossdd <fossdd@pwned.life> possibly vulnerable
redis edge-community 8.0.3-r0 fossdd <fossdd@pwned.life> possibly vulnerable
redis edge-community 8.0.2-r0 fossdd <fossdd@pwned.life> possibly vulnerable
redis edge-community 8.0.1-r0 fossdd <fossdd@pwned.life> possibly vulnerable
redis edge-community 8.0.0-r0 fossdd <fossdd@pwned.life> possibly vulnerable
redis edge-community 7.2.7-r0 fossdd <fossdd@pwned.life> possibly vulnerable
redis edge-community 7.2.5-r2 fossdd <fossdd@pwned.life> possibly vulnerable
redis edge-community 7.2.5-r1 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-community 7.2.5-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-community 7.2.4-r1 TBK <alpine@jjtc.eu> possibly vulnerable
redis edge-community 7.2.4-r0 None possibly vulnerable
redis edge-community 7.2.2-r0 None possibly vulnerable
redis edge-community 7.2.1-r0 None possibly vulnerable
redis 3.23-community 8.4.2-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis 3.23-community 8.4.1-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis 3.23-community 8.4.0-r0 Achill Gilgenast <achill@achill.org> possibly vulnerable
redis 3.19-main 7.2.9-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.19-main 7.2.8-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.19-main 7.2.7-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.19-main 7.2.4-r1 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.19-main 7.2.4-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.19-main 7.2.3-r0 TBK <alpine@jjtc.eu> possibly vulnerable
redis 3.19-main 7.2.2-r0 None possibly vulnerable
redis 3.19-main 7.2.1-r0 None possibly vulnerable