Redis is vulnerable to remote code execution. The vulnerability exists due to an integer overflow in the underlying string library can be used to corrupt the heap and potentially result with denial of service or remote code execution.
github.com/redis/redis/commit/c6ad876774f3cc11e32681ea02a2eead00f2c521
github.com/redis/redis/security/advisories/GHSA-j3cr-9h5g-6cph
lists.fedoraproject.org/archives/list/[email protected]/message/HTYQ5ZF37HNGTZWVNJD3VXP7I6MEEF42/
lists.fedoraproject.org/archives/list/[email protected]/message/VL5KXFN3ATM7IIM7Q4O4PWTSRGZ5744Z/
lists.fedoraproject.org/archives/list/[email protected]/message/WR5WKJWXD4D6S3DJCZ56V74ESLTDQRAB/
secdb.alpinelinux.org/edge/main.yaml
secdb.alpinelinux.org/v3.11/main.yaml
secdb.alpinelinux.org/v3.12/main.yaml
secdb.alpinelinux.org/v3.13/main.yaml
secdb.alpinelinux.org/v3.14/main.yaml
security.gentoo.org/glsa/202209-17
security.netapp.com/advisory/ntap-20211104-0003/
www.debian.org/security/2021/dsa-5001
www.oracle.com/security-alerts/cpuapr2022.html