CVE-2024-31449

EUVD-2024-29337
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
GitHub_MCNA
7 HIGH
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
redisredis
2.8.18 ≤
𝑥
< 6.2.16
redisredis
7.2.0 ≤
𝑥
< 7.2.6
redisredis
7.4.0
redisredis
7.4.0:rc1
redisredis
7.4.0:rc2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
redict
bullseye
ignored
forky
7.3.6+ds-1
fixed
sid
7.3.6+ds-1
fixed
redis
bookworm
5:7.0.15-1~deb12u5
fixed
bookworm (security)
5:7.0.15-1~deb12u6
fixed
bullseye
ignored
bullseye (security)
vulnerable
forky
5:8.0.5-1
fixed
sid
5:8.0.5-1
fixed
trixie
5:8.0.2-3+deb13u1
fixed
trixie (security)
5:8.0.2-3+deb13u1
fixed
valkey
bullseye
ignored
forky
8.1.4+dfsg1-1
fixed
sid
8.1.4+dfsg1-1
fixed
trixie
8.1.1+dfsg1-3+deb13u1
fixed
trixie (security)
8.1.1+dfsg1-3+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
redis
bionic
needed
focal
needed
jammy
needed
noble
needed
oracular
ignored
plucky
needed
questing
not-affected
trusty
needed
xenial
needed