CVE-2024-31449

Name
CVE-2024-31449
Description
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
CONFIRM https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5
MISC https://github.com/redis/redis/commit/1f7c148be2cbacf7d50aa461c58b871e87cc5ed9

Match rules

CPE URI Source package Min version Max version
redis >= 2.6 < 6.2.16
redis >= 7.0.0 < 7.2.6
redis >= 7.3.0 < 7.4.1
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 2.6 < 6.2.16
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 7.0.0 < 7.2.6
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* redis >= 7.3.0 < 7.4.1

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
redict edge-community 7.3.1-r0 fossdd <fossdd@pwned.life> fixed
redict 3.20-community 7.3.1-r0 fossdd <fossdd@pwned.life> fixed
redis 3.20-community 7.2.5-r1 TBK <alpine@jjtc.eu> fixed
redis 3.19-main 7.2.4-r1 TBK <alpine@jjtc.eu> fixed
redis 3.18-main 7.0.15-r1 TBK <alpine@jjtc.eu> fixed
redis 3.17-main 7.0.15-r1 TBK <alpine@jjtc.eu> fixed
valkey 3.20-main 7.2.7-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
valkey edge-main 7.2.7-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
redis edge-community 7.2.5-r2 fossdd <fossdd@pwned.life> fixed
valkey 3.21-main 7.2.7-r0 Jakub Jirutka <jakub@jirutka.cz> fixed
redict 3.21-community 7.3.1-r0 fossdd <fossdd@pwned.life> fixed