Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
References
| Link | Resource |
|---|---|
| https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c | Patch |
| https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 | Vendor Advisory |
| https://github.com/redis/redis/pull/11149 | Issue Tracking Patch |
| https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ | Mailing List Third Party Advisory |
| https://security.netapp.com/advisory/ntap-20230601-0007/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
01 Jun 2023, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| CWE |
28 Apr 2023, 01:05
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| First Time |
Redis redis
Fedoraproject fedora Debian debian Linux Debian Redis Fedoraproject |
|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* |
|
| References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ - Mailing List, Third Party Advisory | |
| References | (MISC) https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 - Vendor Advisory | |
| References | (MISC) https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c - Patch | |
| References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ - Mailing List, Third Party Advisory | |
| References | (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ - Mailing List, Third Party Advisory | |
| References | (MISC) https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html - Mailing List, Third Party Advisory | |
| References | (MISC) https://github.com/redis/redis/pull/11149 - Issue Tracking, Patch |
27 Apr 2023, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Apr 2023, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Apr 2023, 21:25
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-04-18 21:15
Updated : 2023-06-01 14:15
NVD link : CVE-2023-28856
Mitre link : CVE-2023-28856
JSON object : View
Products Affected
debian
- debian_linux
redis
- redis
fedoraproject
- fedora
CWE
CWE-617
Reachable Assertion
