this post was submitted on 09 Nov 2025
171 points (98.3% liked)

Linux

10191 readers
649 users here now

A community for everything relating to the GNU/Linux operating system (except the memes!)

Also, check out:

Original icon base courtesy of lewing@isc.tamu.edu and The GIMP

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] aubeynarf@lemmynsfw.com 14 points 1 week ago (2 children)

While you’re spouting nonsense, this is happening:

https://www.infoq.com/news/2025/11/redis-vulnerability-redishell/

The vulnerability exploits a 13-year-old UAF memory corruption bug in Redis, allowing a post-auth attacker to send a crafted Lua script to escape the default Lua sandbox and execute arbitrary native code. This grants full host access, enabling data theft, wiping, encryption, resource hijacking, and lateral movement within cloud environments.

13 years. That's how long it took to find a critical safety vulnerability in one of the most popular C open source codebases, Redis. This is software that was expertly written by some of the best engineers in the world and yet, mistakes can still happen! It's just that in C a "mistake" can often mean a memory-safety bug that would put user data at risk (...) That's the nature of memory-safety bugs in C: they can hide in plain sight.