VYPR
Medium severity5.5OSV Advisory· Published Apr 9, 2024· Updated Apr 15, 2026

CVE-2024-25116

CVE-2024-25116

Description

RedisBloom adds a set of probabilistic data structures to Redis. Starting in version 2.0.0 and prior to version 2.4.7 and 2.6.10, authenticated users can use the CF.RESERVE command to trigger a runtime assertion and termination of the Redis server process. The problem is fixed in RedisBloom 2.4.7 and 2.6.10.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

RedisBloom 2.0.0-2.4.6/2.6.0-2.6.9 vulnerability allows authenticated users to crash Redis via a crafted CF.RESERVE command due to lack of input validation.

Vulnerability

Overview

RedisBloom versions 2.0.0 through 2.4.6 and 2.6.0 through 2.6.9 contain a denial-of-service vulnerability in the CF.RESERVE command. The root cause is insufficient input validation for parameters such as MAXITERATIONS and BUCKETSIZE. Without appropriate bounds checking, an attacker can supply values that trigger an assertion failure in the cfCreate function, causing the Redis server process to terminate [1].

Exploitation

Conditions

An attacker must have authenticated access to the Redis server. By issuing a CF.RESERVE command with a large MAXITERATIONS value (e.g., exceeding 65535) or an invalid BUCKETSIZE, the vulnerability can be triggered. The attack does not require any special privileges beyond authentication and can be carried out remotely [1][2].

Impact

Successful exploitation leads to an immediate crash of the Redis server, resulting in a denial of service. All data in memory is lost unless persistence is configured, and the server must be restarted to restore service. The availability impact is high, while confidentiality and integrity are not affected [2].

Mitigation

The vulnerability is fixed in RedisBloom versions 2.4.7 and 2.6.10. Users should upgrade to these patched versions or apply the workaround by restricting access to the CF.RESERVE command for untrusted users. The fix introduces proper bounds checking for MAXITERATIONS and BUCKETSIZE parameters [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

3

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

2

News mentions

0

No linked articles in our index yet.