Skip to main content

Security updates fix two vulnerabilities that could lead to RCE and denial-of-service

Summary

Security updates fix two vulnerabilities that could lead to RCE and denial-of-service

Affected platforms

The following platforms are known to be affected:

Threat details

Introduction

Two security advisories have been released to address two vulnerabilities in Redis. Redis is a popular in-memory key-value database that persists on disk.

CVE-2024-46981 is a 'use after free' vulnerability with a CVSSv3 score of 7.0. If exploited, an authenticated attacker could use a specially crafted Lua script to achieve remote code execution.

CVE-2024-51741 is an 'improper input validation' vulnerability with a CVSSv3 score of 4.4. If exploited, an authenticated attacker with sufficient privileges may create a malformed access control list (ACL) selector which could lead to a denial-of-service condition.

Remediation advice

Affected organisations are encouraged to review Redis security advisory GHSA-39h2-x6c4-6w4c and Redis security advisory GHSA-prpq-rh5h-46g9, and apply any relevant updates as soon as practicable.

Remediation steps

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 7 January 2025 3:44 pm