-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-3396-1 [email protected] https://www.debian.org/lts/security/ Chris Lamb April 21, 2023 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : redis Version : 5:5.0.14-1+deb10u4 CVE ID : CVE-2023-28856 Debian Bug : 1034613 It was discovered that there was a potential remote denial of service vulnerability in Redis, a popular 'NoSQL' key-value database. Authenticated users could have used the `HINCRBYFLOAT` command to create an invalid hash field that would have crashed the Redis server on access. For Debian 10 buster, this problem has been fixed in version 5:5.0.14-1+deb10u4. We recommend that you upgrade your redis packages. For the detailed security status of redis please refer to its security tracker page at: https://security-tracker.debian.org/tracker/redis Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmRCd2gACgkQHpU+J9Qx HlhJdg/+KDFuqz4lAe6amu9CH+dCHTegEVVN77HrdmN6A9JHpZvSW3ziVlB5ziH6 NiV65bEWKf1YdTBOUlM+Mb0RjTpp+Ip1cabB4dyl14EsZoBeaESpo9HQBnsMbv8P /XE6fKkaQ99kZ2kzjwrkgmK76U4QVfCD3dmV75V+JK0MvTiy7NnSWbZMpyQMAKNU bYwEM/1YGk4mVeBPNNdvl/6FeplH47vHYOOyW3Sd1Oys2PDkVT2LgZVfGxo+WilG KDE46gYjHpnYn158DsVrdGIsja8NhOE7+nWaOoyhZL4UL6TfaXNWndndrmTx0qAf AFzOVMbfywG4a5DG8K5by/7H9DYzRuhGtO8vXPU9ChP8nZVpXa1wuiaxXupaXWOz NTdk5jQEUxXl506K5+z9tGZjLq0/g7qQWDbbWuROWMoi0uZjk/IcM/vdgLdPVvCl UnZPTOLByctQCLunroDvSvHM+9bKHuY1rNGPlPR75bjXKMZhv1aXVJAqWncVBWPQ 2l8FzsM777M/xqIaSUfkhCy9147+TwltmNBt7WAG7AiQXTBuzUZEvaa0EdTFE3BI DJMCL0IBQxCpiGS95k9rW6d5NIXd3k5LbDKXI+BpaxnYPxLVP4PBjuAmKat7EWL4 hLkkQ8L+fb9aRBTD5ad+FBdtw4Kd4OK1Hk9ALfSiNSxDWIPEGDY= =DSS6 -----END PGP SIGNATURE-----
