CVE-2023-45145

Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
References
Link Resource
https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1 Patch
https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00032.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/464JPNBWE433ZGYXO3KN72VR3KJPWHAW/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNEK2K4IE7MPKRD6H36JXZMJKYS6I5GQ/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZMGTTV5XM4LA66FSIJSETNBBRRPJYOQ/ Mailing List
https://security.netapp.com/advisory/ntap-20231116-0014/ Third Party Advisory
https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1 Patch
https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx Vendor Advisory
https://lists.debian.org/debian-lts-announce/2023/10/msg00032.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/464JPNBWE433ZGYXO3KN72VR3KJPWHAW/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNEK2K4IE7MPKRD6H36JXZMJKYS6I5GQ/ Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZMGTTV5XM4LA66FSIJSETNBBRRPJYOQ/ Mailing List
https://security.netapp.com/advisory/ntap-20231116-0014/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
cpe:2.3:a:redis:redis:2.6.0:rc1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2023-10-18 21:15

Updated : 2024-11-21 08:26


NVD link : CVE-2023-45145

Mitre link : CVE-2023-45145

CVE.ORG link : CVE-2023-45145


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • fedora

redis

  • redis
CWE
CWE-668

Exposure of Resource to Wrong Sphere