CVE-2024-51741
Published: January 13, 2025Last modified: January 15, 2025
Description
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem is fixed in Redis 7.2.7 and 7.4.2.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 4.4 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | HIGH |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | redis | Fixed (7.0.15-r2) |
| Stream | redis | Fixed (7.2.7-r0) |