First published: Mon Jan 06 2025(Updated: )
Last updated 20 March 2025
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
ioredis | <7.2.7<7.4.2 | |
debian/redict | 7.3.2+ds-1 | |
debian/redis | 5:6.0.16-1+deb11u2 5:6.0.16-1+deb11u5 5:7.0.15-1~deb12u3 5:7.0.15-3 | |
debian/valkey | 8.0.2+dfsg1-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51741 is classified as a denial of service vulnerability affecting Redis.
To fix CVE-2024-51741, upgrade Redis to version 7.2.7 or 7.4.2 or later.
CVE-2024-51741 affects Redis versions prior to 7.2.7 and 7.4.2, particularly instances with authenticated users that can modify ACL selectors.
The implications of CVE-2024-51741 include a potential server panic and subsequent denial of service to affected Redis instances.
As of now, there is no public information regarding active exploitation of CVE-2024-51741.