First published: Mon Oct 07 2024(Updated: )
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
ioredis | <6.2.16<7.2.6<7.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2317056 is classified as critical due to the potential for remote code execution.
To fix REDHAT-BUG-2317056, upgrade your Redis installation to a version higher than 6.2.16, 7.2.6, or 7.4.1.
All versions of Redis with Lua scripting up to 6.2.16, 7.2.6, and 7.4.1 are affected by REDHAT-BUG-2317056.
An authenticated user can exploit the vulnerability in REDHAT-BUG-2317056 by using a specially crafted Lua script.
REDHAT-BUG-2317056 can lead to a stack buffer overflow, potentially allowing an attacker to execute arbitrary code remotely.