Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
{ "vanir_signatures": [ { "id": "CVE-2024-31227-54f6e5e1", "signature_type": "Function", "digest": { "function_hash": "40661584271837133427091237980144603108", "length": 4281.0 }, "target": { "file": "src/acl.c", "function": "ACLSetSelector" }, "deprecated": false, "signature_version": "v1", "source": "https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a" }, { "id": "CVE-2024-31227-f772918c", "signature_type": "Line", "digest": { "line_hashes": [ "122073505150330779881925889376104048481", "20546548576662628414487098384772441091", "12194845935100251552104546068211565647", "96821037693610244447265708658612769828" ], "threshold": 0.9 }, "target": { "file": "src/acl.c" }, "deprecated": false, "signature_version": "v1", "source": "https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a" } ] }