Количество 16
Количество 16
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31228
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Aut ...
SUSE-SU-2024:3575-1
Security update for redis
SUSE-SU-2025:0081-1
Security update for redis
SUSE-SU-2024:3549-1
Security update for redis7
SUSE-SU-2024:3537-1
Security update for redis7
SUSE-SU-2024:3535-1
Security update for redis
ROS-20241017-05
Множественные уязвимости redis
RLSA-2025:0693
Important: redis security update
ELSA-2025-0693
ELSA-2025-0693: redis security update (IMPORTANT)
ELSA-2024-10869
ELSA-2024-10869: redis:7 security update (MODERATE)
RLSA-2025:0595
Important: redis:6 security update
ELSA-2025-0595
ELSA-2025-0595: redis:6 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 1% Низкий | больше 1 года назад | |
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 1% Низкий | больше 1 года назад | |
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 1% Низкий | больше 1 года назад | |
CVSS3: 5.5 | 1% Низкий | около 1 года назад | ||
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Aut ... | CVSS3: 5.5 | 1% Низкий | больше 1 года назад | |
SUSE-SU-2024:3575-1 Security update for redis | больше 1 года назад | |||
SUSE-SU-2025:0081-1 Security update for redis | 12 месяцев назад | |||
SUSE-SU-2024:3549-1 Security update for redis7 | больше 1 года назад | |||
SUSE-SU-2024:3537-1 Security update for redis7 | больше 1 года назад | |||
SUSE-SU-2024:3535-1 Security update for redis | больше 1 года назад | |||
ROS-20241017-05 Множественные уязвимости redis | CVSS3: 8.8 | около 1 года назад | ||
RLSA-2025:0693 Important: redis security update | 10 месяцев назад | |||
ELSA-2025-0693 ELSA-2025-0693: redis security update (IMPORTANT) | 12 месяцев назад | |||
ELSA-2024-10869 ELSA-2024-10869: redis:7 security update (MODERATE) | около 1 года назад | |||
RLSA-2025:0595 Important: redis:6 security update | 11 месяцев назад | |||
ELSA-2025-0595 ELSA-2025-0595: redis:6 security update (IMPORTANT) | 12 месяцев назад |
Уязвимостей на страницу