USN-8169-1

Source
https://ubuntu.com/security/notices/USN-8169-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-8169-1
Upstream
Related
Published
2026-04-13T13:18:43Z
Modified
2026-04-22T11:52:43.416736Z
Summary
redis, lua5.1, lua-cjson, lua-bitop vulnerabilities
Details

It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in lua5.1 on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2025-49844)

It was discovered that Redis incorrectly handled certain specially crafted Lua scripts. A remote attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in lua-bitop on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS and in redis on Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 24.04 LTS. (CVE-2024-31449)

Seiya Nakata and Yudai Fujiwara discovered that Redis incorrectly handled certain specially crafted Lua scripts. An attacker could possibly use this issue to cause heap corruption and execute arbitrary code. This issue was only addressed in lua-cjson on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-24834)

References

Affected packages

Ubuntu:24.04:LTS
redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@5:7.0.15-1ubuntu0.24.04.4?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:7.0.15-1ubuntu0.24.04.4

Affected versions

5:7.*
5:7.0.12-1
5:7.0.14-1
5:7.0.14-2
5:7.0.15-1
5:7.0.15-1build1
5:7.0.15-1build2
5:7.0.15-1ubuntu0.24.04.1
5:7.0.15-1ubuntu0.24.04.2
5:7.0.15-1ubuntu0.24.04.3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "redis",
            "binary_version": "5:7.0.15-1ubuntu0.24.04.4"
        },
        {
            "binary_name": "redis-sentinel",
            "binary_version": "5:7.0.15-1ubuntu0.24.04.4"
        },
        {
            "binary_name": "redis-server",
            "binary_version": "5:7.0.15-1ubuntu0.24.04.4"
        },
        {
            "binary_name": "redis-tools",
            "binary_version": "5:7.0.15-1ubuntu0.24.04.4"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
Ubuntu:Pro:16.04:LTS
redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@2:3.0.6-1ubuntu0.4+esm5?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2:3.0.6-1ubuntu0.4+esm5

Affected versions

2:3.*
2:3.0.3-3
2:3.0.5-1
2:3.0.5-2
2:3.0.5-3
2:3.0.5-4
2:3.0.6-1
2:3.0.6-1ubuntu0.2
2:3.0.6-1ubuntu0.3
2:3.0.6-1ubuntu0.4
2:3.0.6-1ubuntu0.4+esm1
2:3.0.6-1ubuntu0.4+esm2
2:3.0.6-1ubuntu0.4+esm3
2:3.0.6-1ubuntu0.4+esm4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "redis-sentinel",
            "binary_version": "2:3.0.6-1ubuntu0.4+esm5"
        },
        {
            "binary_name": "redis-server",
            "binary_version": "2:3.0.6-1ubuntu0.4+esm5"
        },
        {
            "binary_name": "redis-tools",
            "binary_version": "2:3.0.6-1ubuntu0.4+esm5"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:16.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
Ubuntu:Pro:18.04:LTS
redis

Package

Name
redis
Purl
pkg:deb/ubuntu/redis@5:4.0.9-1ubuntu0.2+esm7?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5:4.0.9-1ubuntu0.2+esm7

Affected versions

4:4.*
4:4.0.1-7
4:4.0.2-6
4:4.0.2-9
5:4.*
5:4.0.5-1
5:4.0.6-1
5:4.0.6-2
5:4.0.7-1
5:4.0.8-1
5:4.0.8-2
5:4.0.9-1
5:4.0.9-1ubuntu0.1
5:4.0.9-1ubuntu0.2
5:4.0.9-1ubuntu0.2+esm2
5:4.0.9-1ubuntu0.2+esm3
5:4.0.9-1ubuntu0.2+esm4
5:4.0.9-1ubuntu0.2+esm5
5:4.0.9-1ubuntu0.2+esm6

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "redis",
            "binary_version": "5:4.0.9-1ubuntu0.2+esm7"
        },
        {
            "binary_name": "redis-sentinel",
            "binary_version": "5:4.0.9-1ubuntu0.2+esm7"
        },
        {
            "binary_name": "redis-server",
            "binary_version": "5:4.0.9-1ubuntu0.2+esm7"
        },
        {
            "binary_name": "redis-tools",
            "binary_version": "5:4.0.9-1ubuntu0.2+esm7"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
Ubuntu:Pro:20.04:LTS
lua-bitop

Package

Name
lua-bitop
Purl
pkg:deb/ubuntu/lua-bitop@1.0.2-5ubuntu0.20.04.1~esm2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2-5ubuntu0.20.04.1~esm2

Affected versions

1.*
1.0.2-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "liblua5.1-bitop0",
            "binary_version": "1.0.2-5ubuntu0.20.04.1~esm2"
        },
        {
            "binary_name": "lua-bitop",
            "binary_version": "1.0.2-5ubuntu0.20.04.1~esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2022-24834",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
lua-cjson

Package

Name
lua-cjson
Purl
pkg:deb/ubuntu/lua-cjson@2.1.0+dfsg-2.1ubuntu0.20.04.1~esm2?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0+dfsg-2.1ubuntu0.20.04.1~esm2

Affected versions

2.*
2.1.0+dfsg-2.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "lua-cjson",
            "binary_version": "2.1.0+dfsg-2.1ubuntu0.20.04.1~esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2022-24834",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
lua5.1

Package

Name
lua5.1
Purl
pkg:deb/ubuntu/lua5.1@5.1.5-8.1ubuntu0.20.04.1~esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.5-8.1ubuntu0.20.04.1~esm1

Affected versions

5.*
5.1.5-8.1build3
5.1.5-8.1build4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "liblua5.1-0",
            "binary_version": "5.1.5-8.1ubuntu0.20.04.1~esm1"
        },
        {
            "binary_name": "lua5.1",
            "binary_version": "5.1.5-8.1ubuntu0.20.04.1~esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2022-24834",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
Ubuntu:Pro:22.04:LTS
lua-bitop

Package

Name
lua-bitop
Purl
pkg:deb/ubuntu/lua-bitop@1.0.2-5ubuntu0.22.04.1~esm2?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.2-5ubuntu0.22.04.1~esm2

Affected versions

1.*
1.0.2-5

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "liblua5.1-bitop0",
            "binary_version": "1.0.2-5ubuntu0.22.04.1~esm2"
        },
        {
            "binary_name": "lua-bitop",
            "binary_version": "1.0.2-5ubuntu0.22.04.1~esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2022-24834",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
lua-cjson

Package

Name
lua-cjson
Purl
pkg:deb/ubuntu/lua-cjson@2.1.0+dfsg-2.1ubuntu0.22.04.1~esm2?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.1.0+dfsg-2.1ubuntu0.22.04.1~esm2

Affected versions

2.*
2.1.0+dfsg-2.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "lua-cjson",
            "binary_version": "2.1.0+dfsg-2.1ubuntu0.22.04.1~esm2"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2022-24834",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"
lua5.1

Package

Name
lua5.1
Purl
pkg:deb/ubuntu/lua5.1@5.1.5-8.1ubuntu0.22.04.1~esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
5.1.5-8.1ubuntu0.22.04.1~esm1

Affected versions

5.*
5.1.5-8.1build4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "liblua5.1-0",
            "binary_version": "5.1.5-8.1ubuntu0.22.04.1~esm1"
        },
        {
            "binary_name": "lua5.1",
            "binary_version": "5.1.5-8.1ubuntu0.22.04.1~esm1"
        }
    ],
    "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}

Database specific

cves_map
{
    "cves": [
        {
            "id": "CVE-2022-24834",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "medium",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2024-31449",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2025-49844",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:Pro:22.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8169-1.json"