• CVE-2024-31449

发布时间: 2024年10月12日

修改时间: 2024年10月18日

概要

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS v3 指标

NVD openEuler
CVSS评分 7.0 7.0
Attack Vector Local Local
Attack Complexity High High
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality High High
Integrity High High
Availability High High

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-4067 redis security update 2024年10月18日
KylinSec-SA-2024-4081 redis security update 2024年10月12日

影响产品

产品 状态
KY3.4-5A redis Fixed
KY3.5.2 redis Fixed
V6 redis Fixed