USN-7824-2

Source
https://ubuntu.com/security/notices/USN-7824-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7824-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7824-2
Upstream
Related
Published
2025-10-16T05:33:16.330288Z
Modified
2025-10-16T22:02:31.330285Z
Summary
redict vulnerability
Details

USN-7824-1 fixed several vulnerabilities in Redis. This update provides the corresponding update for Redict - a fork of Redis.

Original advisory details:

Benny Isaacs, Nir Brakha, and Sagi Tzadik discovered that Redis incorrectly handled memory when running Lua scripts. An authenticated attacker could use this vulnerability to trigger a use-after-free condition, and potentially achieve remote code execution on the Redis server.

References

Affected packages

Ubuntu:25.10 / redict

Package

Name
redict
Purl
pkg:deb/ubuntu/redict@7.3.5+ds-1ubuntu0.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.5+ds-1ubuntu0.1

Affected versions

7.*

7.3.2+ds-1
7.3.5+ds-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.3.5+ds-1ubuntu0.1",
            "binary_name": "redict"
        },
        {
            "binary_version": "7.3.5+ds-1ubuntu0.1",
            "binary_name": "redict-sentinel"
        },
        {
            "binary_version": "7.3.5+ds-1ubuntu0.1",
            "binary_name": "redict-server"
        },
        {
            "binary_version": "7.3.5+ds-1ubuntu0.1",
            "binary_name": "redict-tools"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:25.10",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}

Ubuntu:25.04 / redict

Package

Name
redict
Purl
pkg:deb/ubuntu/redict@7.3.2+ds-1ubuntu0.1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.2+ds-1ubuntu0.1

Affected versions

7.*

7.3.0+ds-3
7.3.1+ds-1
7.3.2+ds-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "7.3.2+ds-1ubuntu0.1",
            "binary_name": "redict"
        },
        {
            "binary_version": "7.3.2+ds-1ubuntu0.1",
            "binary_name": "redict-sentinel"
        },
        {
            "binary_version": "7.3.2+ds-1ubuntu0.1",
            "binary_name": "redict-server"
        },
        {
            "binary_version": "7.3.2+ds-1ubuntu0.1",
            "binary_name": "redict-tools"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map

{
    "ecosystem": "Ubuntu:25.04",
    "cves": [
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ]
}