Lucene search

K
mageiaGentoo FoundationMGASA-2023-0156
HistoryApr 24, 2023 - 3:20 a.m.

Updated redis packages fix security vulnerability

2023-04-2403:20:26
Gentoo Foundation
advisories.mageia.org
11
redis
security vulnerability
authenticated users
hincrbyfloat command
invalid hash field
redis crash
cve-2023-28856
unix

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

53.5%

Authenticated users can use the HINCRBYFLOAT command to create an invalid hash field that will crash Redis on access. (CVE-2023-28856)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchredis< 6.0.19-1redis-6.0.19-1.mga8

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.002 Low

EPSS

Percentile

53.5%