CVE-2023-28856

Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

01 Jun 2023, 14:15

Type Values Removed Values Added
CWE CWE-20
References
  • (MISC) https://security.netapp.com/advisory/ntap-20230601-0007/ -

28 Apr 2023, 01:05

Type Values Removed Values Added
References (MISC) https://github.com/redis/redis/pull/11149 - (MISC) https://github.com/redis/redis/pull/11149 - Issue Tracking, Patch
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ - Mailing List, Third Party Advisory
References (MISC) https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 - (MISC) https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 - Vendor Advisory
References (MISC) https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html - (MISC) https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html - Mailing List, Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ - Mailing List, Third Party Advisory
References (MISC) https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c - (MISC) https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c - Patch
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ - Mailing List, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time Debian
Redis redis
Redis
Fedoraproject
Fedoraproject fedora
Debian debian Linux
CPE cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*

27 Apr 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/ -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/ -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/ -

21 Apr 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html -

18 Apr 2023, 21:25

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-18 21:15

Updated : 2023-12-10 15:01


NVD link : CVE-2023-28856

Mitre link : CVE-2023-28856

CVE.ORG link : CVE-2023-28856


JSON object : View

Products Affected

debian

  • debian_linux

redis

  • redis

fedoraproject

  • fedora
CWE
CWE-617

Reachable Assertion

CWE-20

Improper Input Validation