Redis hits a 10.0 Critical on the CVE scale by way of use-after-free to escape the Lua sandbox and allows arbitrary code execution.<br><br><a href="https://www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844" rel="nofollow" class="ellipsis" title="www.wiz.io/blog/wiz-research-redis-rce-cve-2025-49844"><span class="invisible">https://</span><span class="ellipsis">www.wiz.io/blog/wiz-research-r</span><span class="invisible">edis-rce-cve-2025-49844</span></a><br><br><a href="/tags/redis/" rel="tag">#Redis</a> <a href="/tags/cve/" rel="tag">#CVE</a> <a href="/tags/infosec/" rel="tag">#InfoSec</a> <a href="/tags/lua/" rel="tag">#Lua</a> <a href="/tags/redishell/" rel="tag">#RediShell</a><br>
Edited 181d ago
<p>I tried migrating from redis to valkey but failed with a version mismatch of used RDB. I’m using a rather recent redis version. Any suggestions on how to copy key/value pairs over? Is there tooling to copy the database over? Any help is appreciated!<br>Update: I solved this using rdb-cli <a href="/tags/redis/" rel="tag">#redis</a> <a href="/tags/valkey/" rel="tag">#valkey</a> <a href="/tags/migration/" rel="tag">#migration</a> <a href="/tags/adminhelp/" rel="tag">#adminhelp</a> <a href="/tags/fedihelp/" rel="tag">#fedihelp</a> <a href="/tags/peertube/" rel="tag">#peertube</a></p>
Edited 182d ago
<p><a href="/tags/redis/" rel="tag">#Redis</a>: A13-Year-Old Vulnerability CVE-2025-49844 dubbed <a href="/tags/redishell/" rel="tag">#RediShell</a>: CVSS 10.0 Vulnerability Lets Attackers Run Code Remotely (<a href="/tags/rce/" rel="tag">#RCE</a>) in Redis versions used in 75% of Cloud environments!</p><p>Update your Redis Immediately!</p><p><a href="https://thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html" rel="nofollow" class="ellipsis" title="thehackernews.com/2025/10/13-year-redis-flaw-exposed-cvss-100.html"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/10/13-y</span><span class="invisible">ear-redis-flaw-exposed-cvss-100.html</span></a></p>