{"id":"USN-7824-2","summary":"redict vulnerability","details":"USN-7824-1 fixed several vulnerabilities in Redis. This update provides\nthe corresponding update for Redict - a fork of Redis.\n\nOriginal advisory details:\n\nBenny Isaacs, Nir Brakha, and Sagi Tzadik discovered that Redis incorrectly\nhandled memory when running Lua scripts. An authenticated attacker could use\nthis vulnerability to trigger a use-after-free condition, and potentially \nachieve remote code execution on the Redis server.","modified":"2026-04-27T17:47:27.804218Z","published":"2025-10-16T05:33:16Z","related":["UBUNTU-CVE-2025-49844"],"upstream":["CVE-2025-49844","UBUNTU-CVE-2025-49844"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7824-2"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2025-49844"}],"affected":[{"package":{"name":"redict","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/redict@7.3.5+ds-1ubuntu0.1?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"7.3.5+ds-1ubuntu0.1"}]}],"versions":["7.3.2+ds-1","7.3.5+ds-1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"redict","binary_version":"7.3.5+ds-1ubuntu0.1"},{"binary_name":"redict-sentinel","binary_version":"7.3.5+ds-1ubuntu0.1"},{"binary_name":"redict-server","binary_version":"7.3.5+ds-1ubuntu0.1"},{"binary_name":"redict-tools","binary_version":"7.3.5+ds-1ubuntu0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7824-2.json","cves_map":{"cves":[{"id":"CVE-2025-49844","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"},{"type":"Ubuntu","score":"high"}]}],"ecosystem":"Ubuntu:25.10"}}}],"schema_version":"1.7.5"}