Skip to content

Commit af323a4

Browse files
committed
DOC-5481 Copied CVE-2025-32023 fix to the RS 7.22.0 July maintenance release notes
1 parent 335af2a commit af323a4

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

content/operate/rs/release-notes/rs-7-22-releases/rs-7-22-0-tba.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -167,10 +167,14 @@ Redis Enterprise Software 7.22.0-tba supports open source Redis 7.4, 7.2, and 6.
167167

168168
Redis 7.4.x:
169169

170+
- (CVE-2025-32023) An authenticated user can use a specially crafted string to trigger a stack/heap out-of-bounds write on HyperLogLog operations, which can lead to remote code execution.
171+
170172
- (CVE-2025-21605) An unauthenticated client can cause unlimited growth of output buffers until the server runs out of memory or is terminated, which can lead to denial-of-service.
171173

172174
Redis 7.2.x:
173175

176+
- (CVE-2025-32023) An authenticated user can use a specially crafted string to trigger a stack/heap out-of-bounds write on HyperLogLog operations, which can lead to remote code execution.
177+
174178
- (CVE-2025-21605) An unauthenticated client can cause unlimited growth of output buffers until the server runs out of memory or is terminated, which can lead to denial-of-service.
175179

176180
- (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
@@ -217,6 +221,8 @@ Redis 7.0.x:
217221

218222
Redis 6.2.x:
219223

224+
- (CVE-2025-32023) An authenticated user can use a specially crafted string to trigger a stack/heap out-of-bounds write on HyperLogLog operations, which can lead to remote code execution.
225+
220226
- (CVE-2025-21605) An unauthenticated client can cause unlimited growth of output buffers until the server runs out of memory or is terminated, which can lead to denial-of-service.
221227

222228
- (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.

0 commit comments

Comments
 (0)