Redis is an open source, in-memory database that persists on disk.
Authenticated users can use the HINCRBYFLOAT
command to create an invalid
hash field that will crash Redis on access in affected versions. This issue
has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are
advised to upgrade. There are no known workarounds for this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | redis | < 5:4.0.9-1ubuntu0.2+esm4 | UNKNOWN |
ubuntu | 20.04 | noarch | redis | < 5:5.0.7-2ubuntu0.1+esm2 | UNKNOWN |
ubuntu | 22.04 | noarch | redis | < 5:6.0.16-1ubuntu1+esm1 | UNKNOWN |
ubuntu | 23.10 | noarch | redis | < any | UNKNOWN |
ubuntu | 24.04 | noarch | redis | < any | UNKNOWN |
ubuntu | 14.04 | noarch | redis | < 2:2.8.4-2ubuntu0.2+esm3) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 16.04 | noarch | redis | < 2:3.0.6-1ubuntu0.4+esm2 | UNKNOWN |
github.com/redis/redis/commit/1c1bd618c95e26a8ff5c12e70cbf0117233ef073 (7.0.11)
github.com/redis/redis/commit/bc7fe41e5857a0854d524e2a63a028e9394d2a5c
github.com/redis/redis/commit/e030e351fd7ae8c1b0254982a4f12a4bd15ac66b (6.2.12)
github.com/redis/redis/pull/11149
github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6
launchpad.net/bugs/cve/CVE-2023-28856
nvd.nist.gov/vuln/detail/CVE-2023-28856
security-tracker.debian.org/tracker/CVE-2023-28856
ubuntu.com/security/notices/USN-6531-1
www.cve.org/CVERecord?id=CVE-2023-28856