{"id":"ALPINE-CVE-2026-23631","details":"Redis is an in-memory data structure store. In all versions of redis-server with Lua scripting, an authenticated attacker can exploit the master-replica synchronization mechanism to trigger a use-after-free on replicas where replica-read-only is disabled or can be disabled, which may lead to remote code execution. A workaround is to prevent users from executing Lua scripts or avoid using replicas where replica-read-only is disabled. This is patched in version 8.6.3.","modified":"2026-05-10T20:32:08.095290Z","published":"2026-05-05T17:17:03.503Z","upstream":["CVE-2026-23631"],"references":[{"type":"ADVISORY","url":"https://security.alpinelinux.org/vuln/CVE-2026-23631"}],"affected":[{"package":{"name":"valkey","ecosystem":"Alpine:v3.20","purl":"pkg:apk/alpine/valkey?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.2.13-r0"}]}],"versions":["7.2.11-r0","7.2.5-r0","7.2.5-r1","7.2.5-r2","7.2.7-r0","7.2.8-r0","7.2.9-r0","7.2.9-r1"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2026-23631.json"}},{"package":{"name":"valkey","ecosystem":"Alpine:v3.21","purl":"pkg:apk/alpine/valkey?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.2.13-r0"}]}],"versions":["7.2.11-r0","7.2.12-r0","7.2.5-r0","7.2.5-r1","7.2.5-r2","7.2.7-r0","7.2.8-r0","7.2.9-r0","7.2.9-r1"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2026-23631.json"}},{"package":{"name":"valkey","ecosystem":"Alpine:v3.22","purl":"pkg:apk/alpine/valkey?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.1.7-r0"}]}],"versions":["7.2.5-r0","7.2.5-r1","7.2.5-r2","7.2.7-r0","7.2.8-r0","7.2.9-r0","8.1.1-r0","8.1.1-r1","8.1.1-r2","8.1.4-r0","8.1.6-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2026-23631.json"}},{"package":{"name":"valkey","ecosystem":"Alpine:v3.23","purl":"pkg:apk/alpine/valkey?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"9.0.4-r0"}]}],"versions":["7.2.5-r0","7.2.5-r1","7.2.5-r2","7.2.7-r0","7.2.8-r0","7.2.9-r0","8.1.1-r0","8.1.1-r1","8.1.1-r2","8.1.4-r0","9.0.0-r0","9.0.0-r1","9.0.0-r2","9.0.3-r0"],"ecosystem_specific":{},"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/alpine/ALPINE-CVE-2026-23631.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"}]}