Source: redis
Version: 5:7.0.10-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for redis.

CVE-2023-28856[0]:
| Redis is an open source, in-memory database that persists on disk.
| Authenticated users can use the `HINCRBYFLOAT` command to create an
| invalid hash field that will crash Redis on access in affected
| versions. This issue has been addressed in in versions 7.0.11, 6.2.12,
| and 6.0.19. Users are advised to upgrade. There are no known
| workarounds for this issue.

Chris, this likely we be no-dsa I think; but still, for bookworm it
would be ideal to get the fix (via 7.0.11?) in.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-28856
    https://www.cve.org/CVERecord?id=CVE-2023-28856
[1] https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to