CVE-2023-28856

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/04/2023
Last modified:
01/06/2023

Description

Redis is an open source, in-memory database that persists on disk. Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access in affected versions. This issue has been addressed in in versions 7.0.11, 6.2.12, and 6.0.19. Users are advised to upgrade. There are no known workarounds for this issue.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* 6.0.19 (excluding)
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* 6.2.0 (including) 6.2.12 (excluding)
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:* 7.0.0 (including) 7.0.11 (excluding)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*