Debian Security Advisory

DLA-3396-1 redis -- LTS security update

Date Reported:
21 Apr 2023
Affected Packages:
Security database references:
In Mitre's CVE dictionary: CVE-2023-28856.
More information:

It was discovered that there was a potential remote denial of service vulnerability in Redis, a popular 'NoSQL' key-value database.

Authenticated users could have used the HINCRBYFLOAT command to create an invalid hash field that would have crashed the Redis server on access.

  • CVE-2023-28856

    Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.

For Debian 10 Buster, this problem has been fixed in version 5:5.0.14-1+deb10u4.

We recommend that you upgrade your redis packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: