Bug 2401324 (CVE-2025-49844)

Summary: CVE-2025-49844 Redis: Redis Lua Use-After-Free may lead to remote code execution
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: abarbaro, adam.pupek, aganbat, alinfoot, alizardo, anjoseph, anthomas, aprice, bbrownin, bdettelb, brasmith, carogers, caswilli, cochase, david.keegel, dnakabaa, doconnor, dranck, drenard, dtrifiro, eglynn, ehelms, erezende, ggainey, haoli, hkataria, jajackso, jcammara, jcantril, jchui, jdobes, jhe, jjoyce, jkoehler, jmitchel, jneedle, joehler, jprabhak, jsamir, jschluet, juwatts, jvasik, jwong, kaycoth, kegrant, kgaikwad, koliveir, kshier, ktsao, lcouzens, lhh, lphiri, lsvaty, mabashia, martin.hecht, mburns, mgarciac, mhulan, millard.matt, mskarbek, nboldt, nmoumoul, oezr, omaciel, orabin, osousa, pbraun, pcreech, pgrist, psegedy, psrna, qguo, rblanco, rbryant, rchan, rojacob, shvarugh, simaishi, smailappan, smallamp, smcdonal, stcannon, teagle, tfister, thavo, tmalecek, ttakamiy, vmugicag, weaton, wtam, xiaoxwan, yguenane, zzhou
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A vulnerability found in Redis where a flaw in the Lua scripting engine can trigger a use-after-free condition. An authenticated attacker can exploit this by running a specially crafted Lua script, potentially resulting in remote code execution (RCE) within the Redis process.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2402048, 2402049, 2402050, 2402051    
Bug Blocks:    

Description OSIDB Bzimport 2025-10-03 20:01:38 UTC
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

Comment 4 errata-xmlrpc 2025-10-21 23:54:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:18931 https://access.redhat.com/errata/RHSA-2025:18931

Comment 5 errata-xmlrpc 2025-10-23 08:28:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:18997 https://access.redhat.com/errata/RHSA-2025:18997

Comment 6 errata-xmlrpc 2025-10-23 09:21:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:18996 https://access.redhat.com/errata/RHSA-2025:18996

Comment 7 errata-xmlrpc 2025-10-23 20:23:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:19086 https://access.redhat.com/errata/RHSA-2025:19086

Comment 8 errata-xmlrpc 2025-10-29 09:28:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:19238 https://access.redhat.com/errata/RHSA-2025:19238

Comment 9 errata-xmlrpc 2025-10-29 09:34:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:19237 https://access.redhat.com/errata/RHSA-2025:19237

Comment 10 errata-xmlrpc 2025-10-29 09:39:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:19239 https://access.redhat.com/errata/RHSA-2025:19239

Comment 11 errata-xmlrpc 2025-10-30 10:17:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:19318 https://access.redhat.com/errata/RHSA-2025:19318

Comment 12 errata-xmlrpc 2025-10-30 14:07:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:19345 https://access.redhat.com/errata/RHSA-2025:19345

Comment 13 errata-xmlrpc 2025-11-03 01:36:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:19399 https://access.redhat.com/errata/RHSA-2025:19399

Comment 14 errata-xmlrpc 2025-11-04 14:38:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:19675 https://access.redhat.com/errata/RHSA-2025:19675

Comment 15 errata-xmlrpc 2025-11-11 13:51:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:20926 https://access.redhat.com/errata/RHSA-2025:20926

Comment 16 errata-xmlrpc 2025-11-11 14:59:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:20955 https://access.redhat.com/errata/RHSA-2025:20955

Comment 17 errata-xmlrpc 2025-11-24 01:59:16 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:21916 https://access.redhat.com/errata/RHSA-2025:21916

Comment 18 errata-xmlrpc 2025-11-24 09:41:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:21936 https://access.redhat.com/errata/RHSA-2025:21936