CVE-2024-51741

NameCVE-2024-51741
DescriptionRedis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1092370, 1092371, 1092372

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redict (PTS)trixie7.3.1+ds-1vulnerable
sid7.3.2+ds-1fixed
redis (PTS)bullseye5:6.0.16-1+deb11u2vulnerable
bullseye (security)5:6.0.16-1+deb11u4vulnerable
bookworm, bookworm (security)5:7.0.15-1~deb12u1vulnerable
sid, trixie5:7.0.15-2vulnerable
valkey (PTS)sid, trixie8.0.1+dfsg1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redictsource(unstable)7.3.2+ds-11092372
redissource(unstable)(unfixed)1092370
valkeysource(unstable)(unfixed)1092371

Notes

https://github.com/redis/redis/security/advisories/GHSA-prpq-rh5h-46g9
https://github.com/redis/redis/commit/15e212bf69de28d2b4585aa79cc2a40f49e4a94d (7.2.7)
https://codeberg.org/redict/redict/issues/60
https://codeberg.org/redict/redict/commit/ba5dcb3b161e357de95ec7aa4ab03688559e7222
https://github.com/valkey-io/valkey/commit/7977c55ac9bea7d1443c32ef5ec020767c086d3a

Search for package or bug name: Reporting problems