USN-7824-1

Source
https://ubuntu.com/security/notices/USN-7824-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7824-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7824-1
Upstream
Related
Published
2025-10-15T15:33:18.288268Z
Modified
2025-10-16T19:32:35.909329Z
Summary
redis vulnerability
Details

Benny Isaacs, Nir Brakha, and Sagi Tzadik discovered that Redis incorrectly handled memory when running Lua scripts. An authenticated attacker could use this vulnerability to trigger a use-after-free condition, and potentially achieve remote code execution on the Redis server.

References

Affected packages

Ubuntu:24.04:LTS

redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@5:7.0.15-1ubuntu0.24.04.2?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:7.0.15-1ubuntu0.24.04.2

Affected versions

5:7.*

5:7.0.12-1
5:7.0.14-1
5:7.0.14-2
5:7.0.15-1
5:7.0.15-1build1
5:7.0.15-1build2
5:7.0.15-1ubuntu0.24.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5:7.0.15-1ubuntu0.24.04.2",
            "binary_name": "redis"
        },
        {
            "binary_version": "5:7.0.15-1ubuntu0.24.04.2",
            "binary_name": "redis-sentinel"
        },
        {
            "binary_version": "5:7.0.15-1ubuntu0.24.04.2",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "5:7.0.15-1ubuntu0.24.04.2",
            "binary_name": "redis-tools"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}

Ubuntu:25.04

redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@5:7.0.15-3ubuntu0.1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:7.0.15-3ubuntu0.1

Affected versions

5:7.*

5:7.0.15-1build2
5:7.0.15-2
5:7.0.15-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5:7.0.15-3ubuntu0.1",
            "binary_name": "redis"
        },
        {
            "binary_version": "5:7.0.15-3ubuntu0.1",
            "binary_name": "redis-sentinel"
        },
        {
            "binary_version": "5:7.0.15-3ubuntu0.1",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "5:7.0.15-3ubuntu0.1",
            "binary_name": "redis-tools"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:25.04",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}

Ubuntu:25.10

redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@5:8.0.2-3ubuntu0.25.10.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:8.0.2-3ubuntu0.25.10.1

Affected versions

5:7.*

5:7.0.15-3
5:7.0.15-3.1

5:8.*

5:8.0.2-3
5:8.0.2-3build1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5:8.0.2-3ubuntu0.25.10.1",
            "binary_name": "redis"
        },
        {
            "binary_version": "5:8.0.2-3ubuntu0.25.10.1",
            "binary_name": "redis-sentinel"
        },
        {
            "binary_version": "5:8.0.2-3ubuntu0.25.10.1",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "5:8.0.2-3ubuntu0.25.10.1",
            "binary_name": "redis-tools"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:25.10",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}

Ubuntu:Pro:14.04:LTS

redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@2:2.8.4-2ubuntu0.2+esm5?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:2.8.4-2ubuntu0.2+esm5

Affected versions

2:2.*

2:2.6.13-1
2:2.6.16-3
2:2.8.0-1
2:2.8.2-1
2:2.8.4-2
2:2.8.4-2ubuntu0.2
2:2.8.4-2ubuntu0.2+esm1
2:2.8.4-2ubuntu0.2+esm2
2:2.8.4-2ubuntu0.2+esm3
2:2.8.4-2ubuntu0.2+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:2.8.4-2ubuntu0.2+esm5",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "2:2.8.4-2ubuntu0.2+esm5",
            "binary_name": "redis-tools"
        }
    ],
    "availability": "Available with Ubuntu Pro with Legacy support add-on: https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:14.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}

Ubuntu:Pro:16.04:LTS

redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@2:3.0.6-1ubuntu0.4+esm4?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:3.0.6-1ubuntu0.4+esm4

Affected versions

2:3.*

2:3.0.3-3
2:3.0.5-1
2:3.0.5-2
2:3.0.5-3
2:3.0.5-4
2:3.0.6-1
2:3.0.6-1ubuntu0.2
2:3.0.6-1ubuntu0.3
2:3.0.6-1ubuntu0.4
2:3.0.6-1ubuntu0.4+esm1
2:3.0.6-1ubuntu0.4+esm2
2:3.0.6-1ubuntu0.4+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:3.0.6-1ubuntu0.4+esm4",
            "binary_name": "redis-sentinel"
        },
        {
            "binary_version": "2:3.0.6-1ubuntu0.4+esm4",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "2:3.0.6-1ubuntu0.4+esm4",
            "binary_name": "redis-tools"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:16.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}

Ubuntu:Pro:18.04:LTS

redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@5:4.0.9-1ubuntu0.2+esm6?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:4.0.9-1ubuntu0.2+esm6

Affected versions

4:4.*

4:4.0.1-7
4:4.0.2-6
4:4.0.2-9

5:4.*

5:4.0.5-1
5:4.0.6-1
5:4.0.6-2
5:4.0.7-1
5:4.0.8-1
5:4.0.8-2
5:4.0.9-1
5:4.0.9-1ubuntu0.1
5:4.0.9-1ubuntu0.2
5:4.0.9-1ubuntu0.2+esm2
5:4.0.9-1ubuntu0.2+esm3
5:4.0.9-1ubuntu0.2+esm4
5:4.0.9-1ubuntu0.2+esm5

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5:4.0.9-1ubuntu0.2+esm6",
            "binary_name": "redis"
        },
        {
            "binary_version": "5:4.0.9-1ubuntu0.2+esm6",
            "binary_name": "redis-sentinel"
        },
        {
            "binary_version": "5:4.0.9-1ubuntu0.2+esm6",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "5:4.0.9-1ubuntu0.2+esm6",
            "binary_name": "redis-tools"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:18.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}

Ubuntu:Pro:20.04:LTS

redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@5:5.0.7-2ubuntu0.1+esm4?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:5.0.7-2ubuntu0.1+esm4

Affected versions

5:5.*

5:5.0.5-2build1
5:5.0.6-1
5:5.0.7-1
5:5.0.7-2
5:5.0.7-2ubuntu0.1~esm1
5:5.0.7-2ubuntu0.1
5:5.0.7-2ubuntu0.1+esm1
5:5.0.7-2ubuntu0.1+esm2
5:5.0.7-2ubuntu0.1+esm3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "5:5.0.7-2ubuntu0.1+esm4",
            "binary_name": "redis"
        },
        {
            "binary_version": "5:5.0.7-2ubuntu0.1+esm4",
            "binary_name": "redis-sentinel"
        },
        {
            "binary_version": "5:5.0.7-2ubuntu0.1+esm4",
            "binary_name": "redis-server"
        },
        {
            "binary_version": "5:5.0.7-2ubuntu0.1+esm4",
            "binary_name": "redis-tools"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:Pro:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "high"
                }
            ]
        }
    ]
}