PT-2024-6632 · Redis+11 · Redis+11
Ankki-Zsyang
·
Published
2024-10-02
·
Updated
2026-04-19
·
CVE-2024-31449
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Redis versions prior to 6.2.16, prior to 7.2.6, and prior to 7.4.1.
Redis versions 6.2.16-alt1, 6.2.17-alt1, 7.2.10-alt1, 7.2.11-alt1.
Description
Redis is an in-memory database. An authenticated user can use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, potentially leading to remote code execution. The vulnerability exists in all versions of Redis with Lua scripting enabled. There are no known workarounds for this issue.
Recommendations
Upgrade Redis to version 6.2.16 or later.
Upgrade Redis to version 7.2.6 or later.
Upgrade Redis to version 7.4.1 or later.
Upgrade Redis to version 6.2.16-alt1.
Upgrade Redis to version 6.2.17-alt1.
Upgrade Redis to version 7.2.10-alt1.
Upgrade Redis to version 7.2.11-alt1.
Exploit
Fix
RCE
Stack Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Alt Linux
Almalinux
Astra Linux
Centos
Debian
Linuxmint
Red Hat
Red Os
Redis
Rocky Linux
Suse
Ubuntu