Denial-of-Service Vulnerability in Redis In-Memory Database
CVE-2024-31228
5.5MEDIUM
What is CVE-2024-31228?
Redis, an open-source in-memory database, is susceptible to a denial-of-service attack where authenticated users can exploit specially crafted long string match patterns. This can affect commands like KEYS, SCAN, PSUBSCRIBE, and ACL definitions, leading to unbounded recursion. Such exploitation may cause a stack overflow, resulting in a crash of the Redis process. Users are strongly encouraged to upgrade to the fixed versions—6.2.16, 7.2.6, or 7.4.1—since there are no known workarounds available.
Affected Version(s)
redis >= 2.2.5, < 6.2.16 < 2.2.5, 6.2.16
redis >= 7.0.0, < 7.2.6 < 7.0.0, 7.2.6
redis >= 7.3.0, < 7.4.1 < 7.3.0, 7.4.1
