CVE-2024-31227

NameCVE-2024-31227
DescriptionRedis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1084805

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redict (PTS)sid, trixie7.3.1+ds-1fixed
redis (PTS)bullseye5:6.0.16-1+deb11u2fixed
bullseye (security)5:6.0.16-1+deb11u4fixed
bookworm, bookworm (security)5:7.0.15-1~deb12u1vulnerable
sid, trixie5:7.0.15-2fixed
valkey (PTS)sid, trixie8.0.1+dfsg1-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redictsource(unstable)7.3.1+ds-1
redissourcebullseye(not affected)
redissource(unstable)5:7.0.15-21084805
valkeysource(unstable)8.0.1+dfsg1-1

Notes

[bookworm] - redis <no-dsa> (Minor issue)
[bullseye] - redis <not-affected> (Vulnerable code not present)
https://github.com/redis/redis/security/advisories/GHSA-38p4-26x2-vqhh
https://github.com/redis/redis/commit/b351d5a3210e61cc3b22ba38a723d6da8f3c298a (7.2.6)
https://github.com/valkey-io/valkey/pull/1114
https://github.com/valkey-io/valkey/commit/4fbab5740bfef66918d6c2950dd2b3b4e07815a2 (8.0.1)

Search for package or bug name: Reporting problems