CVE-2024-31228

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-31228
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-31228.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-31228
Aliases
Downstream
Related
Published
2024-10-07T19:51:06Z
Modified
2025-10-15T04:33:35Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Denial-of-service due to unbounded pattern matching in Redis
Details

Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/redis/redis

Affected ranges

Type
GIT
Repo
https://github.com/redis/redis
Events
Type
GIT
Repo
https://github.com/redis/redis
Events