Source: redis Version: 5:7.0.10-1 Severity: important Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerability was published for redis. CVE-2023-28856[0]: | Redis is an open source, in-memory database that persists on disk. | Authenticated users can use the `HINCRBYFLOAT` command to create an | invalid hash field that will crash Redis on access in affected | versions. This issue has been addressed in in versions 7.0.11, 6.2.12, | and 6.0.19. Users are advised to upgrade. There are no known | workarounds for this issue. Chris, this likely we be no-dsa I think; but still, for bookworm it would be ideal to get the fix (via 7.0.11?) in. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-28856 https://www.cve.org/CVERecord?id=CVE-2023-28856 [1] https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6 Please adjust the affected versions in the BTS as needed. Regards, Salvatore