Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-29337 | Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 05 Sep 2025 04:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:redis:redis:7.4.0:-:*:*:*:*:*:* cpe:2.3:a:redis:redis:7.4.0:rc1:*:*:*:*:*:* cpe:2.3:a:redis:redis:7.4.0:rc2:*:*:*:*:*:* |
Wed, 16 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Feb 2025 09:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat discovery
|
|
| CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/o:redhat:discovery:1.0::el9 |
|
| Vendors & Products |
Redhat discovery
|
Sat, 07 Dec 2024 11:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/a:redhat:enterprise_linux:9 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Tue, 08 Oct 2024 10:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Tue, 08 Oct 2024 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redis
Redis redis |
|
| CPEs | cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Redis
Redis redis |
|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 05:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Lua library commands may lead to stack overflow and RCE in Redis | |
| Weaknesses | CWE-121 CWE-20 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-19T04:55:42.670Z
Reserved: 2024-04-03T17:55:32.646Z
Link: CVE-2024-31449
Updated: 2024-10-07T20:22:54.425Z
Status : Analyzed
Published: 2024-10-07T20:15:05.507
Modified: 2025-09-04T19:03:33.420
Link: CVE-2024-31449
OpenCVE Enrichment
No data.
EUVD