Denial-of-Service Vulnerability in Redis In-Memory Database
CVE-2024-31228
What is CVE-2024-31228?
Redis, an open-source in-memory database, is susceptible to a denial-of-service attack where authenticated users can exploit specially crafted long string match patterns. This can affect commands like KEYS, SCAN, PSUBSCRIBE, and ACL definitions, leading to unbounded recursion. Such exploitation may cause a stack overflow, resulting in a crash of the Redis process. Users are strongly encouraged to upgrade to the fixed versions—6.2.16, 7.2.6, or 7.4.1—since there are no known workarounds available.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
redis >= 2.2.5, < 6.2.16 < 2.2.5, 6.2.16
redis >= 7.0.0, < 7.2.6 < 7.0.0, 7.2.6
redis >= 7.3.0, < 7.4.1 < 7.3.0, 7.4.1
References
CVSS V3.1
Timeline
Vulnerability published
