CVE-2024-46981

NameCVE-2024-46981
DescriptionRedis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1092370, 1092371, 1092372

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redict (PTS)trixie7.3.1+ds-1vulnerable
sid7.3.2+ds-1fixed
redis (PTS)bullseye5:6.0.16-1+deb11u2vulnerable
bullseye (security)5:6.0.16-1+deb11u4vulnerable
bookworm, bookworm (security)5:7.0.15-1~deb12u1vulnerable
sid, trixie5:7.0.15-2vulnerable
valkey (PTS)sid, trixie8.0.1+dfsg1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redictsource(unstable)7.3.2+ds-11092372
redissource(unstable)(unfixed)1092370
valkeysource(unstable)(unfixed)1092371

Notes

https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c
https://github.com/redis/redis/commit/e344b2b5879aa52870e6838212dfb78b7968fcbf (7.2.7)
https://codeberg.org/redict/redict/issues/60
https://codeberg.org/redict/redict/commit/d12b0cf438664a14999b23a6a1c5b6f39a5f7e37
https://github.com/valkey-io/valkey/commit/4ffd3ebdeb028d0b9e50cf5986e9f1b6a2e1c031

Search for package or bug name: Reporting problems