Количество 15
Количество 15
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CVE-2024-31228
Denial-of-service due to unbounded pattern matching in Redis
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Aut ...
SUSE-SU-2024:3575-1
Security update for redis
SUSE-SU-2025:0081-1
Security update for redis
SUSE-SU-2024:3549-1
Security update for redis7
SUSE-SU-2024:3537-1
Security update for redis7
SUSE-SU-2024:3535-1
Security update for redis
ROS-20241017-05
Множественные уязвимости redis
RLSA-2025:0693
Important: redis security update
ELSA-2025-0693
ELSA-2025-0693: redis security update (IMPORTANT)
ELSA-2024-10869
ELSA-2024-10869: redis:7 security update (MODERATE)
ELSA-2025-0595
ELSA-2025-0595: redis:6 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-31228 Denial-of-service due to unbounded pattern matching in Redis | CVSS3: 5.5 | 0% Низкий | 12 месяцев назад | |
CVE-2024-31228 Redis is an open source, in-memory database that persists on disk. Aut ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
SUSE-SU-2024:3575-1 Security update for redis | около 1 года назад | |||
SUSE-SU-2025:0081-1 Security update for redis | 10 месяцев назад | |||
SUSE-SU-2024:3549-1 Security update for redis7 | около 1 года назад | |||
SUSE-SU-2024:3537-1 Security update for redis7 | около 1 года назад | |||
SUSE-SU-2024:3535-1 Security update for redis | около 1 года назад | |||
ROS-20241017-05 Множественные уязвимости redis | CVSS3: 8.8 | около 1 года назад | ||
RLSA-2025:0693 Important: redis security update | 8 месяцев назад | |||
ELSA-2025-0693 ELSA-2025-0693: redis security update (IMPORTANT) | 10 месяцев назад | |||
ELSA-2024-10869 ELSA-2024-10869: redis:7 security update (MODERATE) | 11 месяцев назад | |||
ELSA-2025-0595 ELSA-2025-0595: redis:6 security update (IMPORTANT) | 10 месяцев назад |
Уязвимостей на страницу