Debian Security Advisory
DLA-3396-1 redis -- LTS security update
- Date Reported:
- 21 Apr 2023
- Affected Packages:
- redis
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2023-28856.
- More information:
-
It was discovered that there was a potential remote denial of service vulnerability in Redis, a popular 'NoSQL' key-value database.
Authenticated users could have used the
HINCRBYFLOAT
command to create an invalid hash field that would have crashed the Redis server on access.- CVE-2023-28856
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
For Debian 10
Buster
, this problem has been fixed in version 5:5.0.14-1+deb10u4.We recommend that you upgrade your redis packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2023-28856