Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c | Patch |
https://github.com/redis/redis/pull/11149 | Issue Tracking Patch |
https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ | Mailing List Third Party Advisory |
https://security.netapp.com/advisory/ntap-20230601-0007/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
No history.
Information
Published : 2023-04-18 21:15
Updated : 2023-06-01 14:15
NVD link : CVE-2023-28856
Mitre link : CVE-2023-28856
CVE.ORG link : CVE-2023-28856
JSON object : View
Products Affected
debian
- debian_linux
redis
- redis
fedoraproject
- fedora