Skip to main content
Version: latest

CVE-2024-46981

CVE Details

Visit the official vulnerability details page for CVE-2024-46981 to learn more.

Initial Publication

05/15/2025

Last Update

10/14/2025

Third Party Dependency

redis

NIST CVE Summary

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem is fixed in 7.4.2, 7.2.7, and 6.2.17. An additional workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.

CVE Severity

9.8

Our Official Summary

Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack overflow in the bit library.

This vulnerability is reported on Redis components in third party images. The stack overflow vulnerability requires an authenticated user to execute a specially crafted Lua script, potentially leading to denial of service. This vulnerability only applies if you are using harbor as the registry in the palette or workload cluster.

The risk of exploitation is low from harbor deployment because Redis instance is configured with restricted access; Lua scripting functionality is disabled.

We will upgrade harbor when fixes become available from the upstream.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.7.23⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.6.41⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
09/15/2025Status changed from Open to Ongoing
09/15/2025Official summary added
09/06/2025Advisory assigned with CRITICAL severity