This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: Redis versions β€ 8.2.1 suffer from a **Use-After-Free (UAF)** bug in the Lua parser. π§ **Mechanism**: A crafted Lua script triggers a race condition with the Garbage Collector (GC).β¦
π‘οΈ **CWE**: CWE-416 (Use-After-Free). π **Root Cause**: The `luaY_parser` function fails to **anchor the chunk name string** on the Lua stack before invoking the lexer.β¦
π» **Privileges**: Hackers gain **Remote Code Execution (RCE)**. π **Impact**: Full control over the Redis server process. π **Data**: Can read/write any data accessible to the Redis instance.β¦
π οΈ **Official Fix**: **YES**. Patched in **Redis 8.2.2**. π **Commit**: `d5728cb` fixes the issue by pushing the chunk name to the stack before parsing. π’ **Advisory**: GHSA-4789-qfc9-5f9q confirms the fix.β¦