Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 21 Aug 2025 22:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*

Fri, 30 May 2025 21:45:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 29 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 May 2025 09:15:00 +0000

Type Values Removed Values Added
Description Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exists in redis-check-aof due to the use of memcpy with strlen(filepath) when copying a user-supplied file path into a fixed-size stack buffer. This allows an attacker to overflow the stack and potentially achieve code execution. This issue has been patched in version 8.0.2.
Title redis-check-aof may lead to stack overflow and potential RCE
Weaknesses CWE-121
CWE-20
References
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-05-29T13:43:09.725Z

Reserved: 2025-02-19T16:30:47.779Z

Link: CVE-2025-27151

cve-icon Vulnrichment

Updated: 2025-05-29T13:42:57.703Z

cve-icon NVD

Status : Analyzed

Published: 2025-05-29T09:15:25.980

Modified: 2025-08-21T22:28:57.630

Link: CVE-2025-27151

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-05-29T09:07:34Z

Links: CVE-2025-27151 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-12T15:26:10Z