CVE-2023-28856

Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
References
Link Resource
https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c Patch
https://github.com/redis/redis/pull/11149 Issue Tracking Patch
https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230601-0007/
https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c Patch
https://github.com/redis/redis/pull/11149 Issue Tracking Patch
https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20230601-0007/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

21 Nov 2024, 07:56

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 5.5
References () https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c - Patch () https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c - Patch
References () https://github.com/redis/redis/pull/11149 - Issue Tracking, Patch () https://github.com/redis/redis/pull/11149 - Issue Tracking, Patch
References () https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 - Vendor Advisory () https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ - Mailing List, Third Party Advisory () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20230601-0007/ - () https://security.netapp.com/advisory/ntap-20230601-0007/ -

01 Jun 2023, 14:15

Type Values Removed Values Added
References
  • (MISC) https://security.netapp.com/advisory/ntap-20230601-0007/ -
CWE CWE-20

Information

Published : 2023-04-18 21:15

Updated : 2024-11-21 07:56


NVD link : CVE-2023-28856

Mitre link : CVE-2023-28856

CVE.ORG link : CVE-2023-28856


JSON object : View

Products Affected

debian

  • debian_linux

redis

  • redis

fedoraproject

  • fedora
CWE
CWE-20

Improper Input Validation

CWE-617

Reachable Assertion