Количество 14
Количество 14

CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVE-2024-31228
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Aut ...

SUSE-SU-2024:3575-1
Security update for redis

SUSE-SU-2025:0081-1
Security update for redis

SUSE-SU-2024:3549-1
Security update for redis7

SUSE-SU-2024:3537-1
Security update for redis7

SUSE-SU-2024:3535-1
Security update for redis

ROS-20241017-05
Множественные уязвимости redis
ELSA-2025-0693
ELSA-2025-0693: redis security update (IMPORTANT)
ELSA-2024-10869
ELSA-2024-10869: redis:7 security update (MODERATE)
ELSA-2025-0595
ELSA-2025-0595: redis:6 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад |
![]() | CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад |
![]() | CVSS3: 5.5 | 0% Низкий | 7 месяцев назад | |
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Aut ... | CVSS3: 5.5 | 0% Низкий | 9 месяцев назад | |
![]() | SUSE-SU-2024:3575-1 Security update for redis | 9 месяцев назад | ||
![]() | SUSE-SU-2025:0081-1 Security update for redis | 5 месяцев назад | ||
![]() | SUSE-SU-2024:3549-1 Security update for redis7 | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3537-1 Security update for redis7 | 9 месяцев назад | ||
![]() | SUSE-SU-2024:3535-1 Security update for redis | 9 месяцев назад | ||
![]() | ROS-20241017-05 Множественные уязвимости redis | CVSS3: 8.8 | 8 месяцев назад | |
ELSA-2025-0693 ELSA-2025-0693: redis security update (IMPORTANT) | 5 месяцев назад | |||
ELSA-2024-10869 ELSA-2024-10869: redis:7 security update (MODERATE) | 7 месяцев назад | |||
ELSA-2025-0595 ELSA-2025-0595: redis:6 security update (IMPORTANT) | 5 месяцев назад |
Уязвимостей на страницу