Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
References
Link | Resource |
---|---|
https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a | Patch |
https://github.com/redis/redis/security/advisories/GHSA-38p4-26x2-vqhh | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
26 Aug 2025, 17:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a - Patch | |
References | () https://github.com/redis/redis/security/advisories/GHSA-38p4-26x2-vqhh - Third Party Advisory | |
First Time |
Redis redis
Redis |
|
CPE | cpe:2.3:a:redis:redis:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* |
10 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
07 Oct 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-07 20:15
Updated : 2025-08-26 17:44
NVD link : CVE-2024-31227
Mitre link : CVE-2024-31227
CVE.ORG link : CVE-2024-31227
JSON object : View
Products Affected
redis
- redis
CWE
CWE-20
Improper Input Validation