Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3973-1 redis security update
EUVD EUVD EUVD-2024-29124 Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Ubuntu USN Ubuntu USN USN-7321-1 Redis vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 07:30:00 +0900

Type Values Removed Values Added
References

Fri, 05 Sep 2025 04:15:00 +0900

Type Values Removed Values Added
First Time appeared Redis
Redis redis
CPEs cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:7.4.0:-:*:*:*:*:*:*
cpe:2.3:a:redis:redis:7.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redis:redis:7.4.0:rc2:*:*:*:*:*:*
Vendors & Products Redis
Redis redis

Thu, 13 Feb 2025 09:45:00 +0900

Type Values Removed Values Added
First Time appeared Redhat discovery
CPEs cpe:/a:redhat:enterprise_linux:8
cpe:/o:redhat:discovery:1.0::el9
Vendors & Products Redhat discovery

Sat, 07 Dec 2024 11:45:00 +0900

Type Values Removed Values Added
First Time appeared Redhat
Redhat enterprise Linux
CPEs cpe:/a:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux

Tue, 08 Oct 2024 10:45:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 08 Oct 2024 06:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 05:00:00 +0900

Type Values Removed Values Added
Description Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Denial-of-service due to unbounded pattern matching in Redis
Weaknesses CWE-674
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-11-03T21:54:38.487Z

Reserved: 2024-03-29T14:16:31.902Z

Link: CVE-2024-31228

cve-icon Vulnrichment

Updated: 2025-11-03T21:54:38.487Z

cve-icon NVD

Status : Modified

Published: 2024-10-07T20:15:05.277

Modified: 2025-11-03T22:16:51.340

Link: CVE-2024-31228

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-10-07T19:51:06Z

Links: CVE-2024-31228 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses