Unrated severityNVD Advisory· Published Oct 7, 2024· Updated Oct 7, 2024
Denial-of-service due to malformed ACL selectors in Redis
CVE-2024-31227
Description
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Affected products
31- osv-coords30 versionspkg:apk/chainguard/py3.10-redispkg:apk/chainguard/py3.11-redispkg:apk/chainguard/py3.12-redispkg:apk/chainguard/py3.13-redispkg:apk/chainguard/py3-redispkg:apk/chainguard/redis-7.2pkg:apk/chainguard/redis-7.2-iamguarded-compatpkg:apk/chainguard/redis-7.4pkg:apk/chainguard/redis-benchmark-7.2pkg:apk/chainguard/redis-cli-7.2pkg:apk/chainguard/redis-cluster-7.2-iamguarded-compatpkg:apk/chainguard/redis-sentinel-7.2-iamguarded-compatpkg:apk/wolfi/redis-7.2pkg:apk/wolfi/redis-7.4pkg:apk/wolfi/redis-benchmark-7.2pkg:apk/wolfi/redis-cli-7.2pkg:bitnami/keydbpkg:bitnami/redispkg:bitnami/valkeypkg:rpm/almalinux/redispkg:rpm/almalinux/redis-develpkg:rpm/almalinux/redis-docpkg:rpm/opensuse/redis7&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/redis7&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/redis&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/redis&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/valkey&distro=openSUSE%20Tumbleweedpkg:rpm/suse/redis7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/redis7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/redis&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6
< 0+ 29 more
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 0
- (no CPE)range: < 7.2.6-r0
- (no CPE)range: < 7.2.12-r2
- (no CPE)range: < 7.4.1-r0
- (no CPE)range: < 7.2.12-r2
- (no CPE)range: < 7.2.12-r2
- (no CPE)range: < 7.2.12-r2
- (no CPE)range: < 7.2.12-r2
- (no CPE)range: < 7.2.6-r0
- (no CPE)range: < 7.4.1-r0
- (no CPE)range: < 7.2.12-r2
- (no CPE)range: < 7.2.12-r2
- (no CPE)range: >= 7.0.0
- (no CPE)range: >= 7.0.0, < 7.2.8
- (no CPE)range: < 7.2.7
- (no CPE)range: < 7.2.6-1.module_el9.5.0+130+36ae7635
- (no CPE)range: < 7.2.6-1.module_el9.5.0+130+36ae7635
- (no CPE)range: < 7.2.6-1.module_el9.5.0+130+36ae7635
- (no CPE)range: < 7.0.8-150500.3.12.1
- (no CPE)range: < 7.0.8-150600.8.3.1
- (no CPE)range: < 7.2.4-150600.3.3.1
- (no CPE)range: < 8.0.2-1.1
- (no CPE)range: < 8.0.1-1.1
- (no CPE)range: < 7.0.8-150500.3.12.1
- (no CPE)range: < 7.0.8-150600.8.3.1
- (no CPE)range: < 7.2.4-150600.3.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298amitrex_refsource_MISC
- github.com/redis/redis/security/advisories/GHSA-38p4-26x2-vqhhmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.