CVE-2024-46981Use After Free in Redis

CWE-416Use After Free9 documents6 sources
Severity
9.8CRITICALNVD
OSV6.5
EPSS
75.7%
top 1.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 6
Latest updateMar 19

Description

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages13 packages

CVEListV5redis/redis< 6.2.17+2
NVDredis/redis6.2.06.2.17+2
debiandebian/redis< redict 7.3.2+ds-1 (forky)
Debianredis/redis< 5:6.0.16-1+deb11u5+3
Ubunturedis/redis< 5:7.0.15-1ubuntu0.24.04.1+5

Also affects: Debian Linux 11.0

🔴Vulnerability Details

3
OSV
valkey vulnerabilities2025-03-19
OSV
redis vulnerabilities2025-03-05
OSV
CVE-2024-46981: Redis is an open source, in-memory database that persists on disk2025-01-06

📋Vendor Advisories

5
Ubuntu
Valkey vulnerabilities2025-03-19
Ubuntu
Redis vulnerabilities2025-03-05
Microsoft
Redis' Lua library commands may lead to remote code execution2025-01-14
Red Hat
redis: Redis' Lua library commands may lead to remote code execution2025-01-06
Debian
CVE-2024-46981: redict - Redis is an open source, in-memory database that persists on disk. An authentica...2024
CVE-2024-46981 — Use After Free in Redis | cvebase