First published: Mon Jan 06 2025(Updated: )
Last updated 8 January 2025
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ioredis | <7.4.2<7.2.7<6.2.17 | |
debian/redict | 7.3.2+ds-1 | |
debian/redis | <=5:6.0.16-1+deb11u2<=5:7.0.15-1~deb12u2 | 5:6.0.16-1+deb11u5 5:7.0.15-1~deb12u3 5:7.0.15-3 |
debian/valkey | 8.0.2+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46981 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-46981, upgrade your Redis installation to version 7.4.2, 7.2.7, or 6.2.17.
CVE-2024-46981 affects all Redis versions prior to 7.4.2, 7.2.7, and 6.2.17.
No, an attacker must be an authenticated user to exploit CVE-2024-46981.
CVE-2024-46981 is a code execution vulnerability that arises from improper handling of the Lua scripting functionality in Redis.