CVE-2023-28856
Description
Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.
CWE
- CWE-617 — CWE-617: Reachable Assertion
- CWE-20 — CWE-20: Improper Input Validation
Affected
- redis / redis — v=>= 7.0.0, < 7.0.11 [affected]; v=>= 6.2.0, < 6.2.12 [affected]; v=< 6.0.19 [affected]
CVSS
- 3.1 score=5.5 severity=MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
References
- https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 x_refsource_CONFIRM
- https://github.com/redis/redis/pull/11149 x_refsource_MISC
- https://github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c x_refsource_MISC
- https://lists.debian.org/debian-lts-announce/2023/04/msg00023.html
- https://lists.fedoraproject.org/archives/list/[email protected]/message/OQGKMKSQE67L32HE6W5EI2I2YKW5VWHI/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/LPUTH7NBQTZDVJWFNUD24ZCS6NDUFYS6/
- https://lists.fedoraproject.org/archives/list/[email protected]/message/EQ4DJSO4DMR55AWK6OPVJH5UTEB35R2Z/
- https://security.netapp.com/advisory/ntap-20230601-0007/
Source
cvelistV5-main/cves/2023/28xxx/CVE-2023-28856.json