Denial-of-Service Vulnerability in Redis In-Memory Database
CVE-2024-31228
Currently unrated
Summary
Redis, an open-source in-memory database, is susceptible to a denial-of-service attack where authenticated users can exploit specially crafted long string match patterns. This can affect commands like KEYS
, SCAN
, PSUBSCRIBE
, and ACL definitions, leading to unbounded recursion. Such exploitation may cause a stack overflow, resulting in a crash of the Redis process. Users are strongly encouraged to upgrade to the fixed versions—6.2.16, 7.2.6, or 7.4.1—since there are no known workarounds available.
References
Timeline
Vulnerability published