First published: Mon Oct 07 2024(Updated: )
Last updated 10 March 2025
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ioredis | <6.2.16<7.2.6<7.4.1 | |
debian/redict | 7.3.2+ds-1 | |
debian/redis | <=5:6.0.16-1+deb11u2 | 5:6.0.16-1+deb11u5 5:7.0.15-1~deb12u3 5:7.0.15-3 |
debian/valkey | 8.0.2+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31228 is classified as a denial-of-service vulnerability.
To mitigate CVE-2024-31228, upgrade Redis to a version later than 6.2.16, 7.2.6, or 7.4.1.
CVE-2024-31228 affects Redis versions prior to 6.2.16, 7.2.6, and 7.4.1.
Commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST, and ACL definition are impacted by CVE-2024-31228.
Authenticated users can exploit CVE-2024-31228 by sending specially crafted, long string match patterns to trigger a denial-of-service.