Bug 1363670 (CVE-2013-7458)
Summary: | CVE-2013-7458 redis: world-readable ~/.rediscli_history | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Martin Prpič <mprpic> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | aortega, apevec, ayoung, chrisw, cvsbot-xmlrpc, fabian.deutsch, fpercoco, i, jal233, jschluet, kbasil, lhh, lpeer, markmc, msamia, rbryant, rhos-maint, sclewis, slong, tdecacqu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A permissions flaw was found in Redis, where redis-cli stores its history in ~/.rediscli_history. The file is created with permissions 0644, which could lead to the exposure of sensitive data for users with world-readable home directories.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2016-08-12 04:47:05 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1363671, 1363672 | ||
Bug Blocks: | 1363674 |
Description
Martin Prpič
2016-08-03 10:37:50 UTC
Created redis tracking bugs for this issue: Affects: fedora-all [bug 1363671] Affects: epel-all [bug 1363672] Fixed upstream in Redis 3.2.3 Released Tue Aug 02 10:55:24 CEST 2016 http://download.redis.io/redis-stable/00-RELEASENOTES Redis-cli created the history file with insecure permissions, allowing reading from the file. This was actually a bug in linenoise which is now fixed. The applied fix is from Chris Lamb. Statement: Red Hat Product Security has rated this issue as having security impact of Low. Further, home directories are not world readable on RHEL distributions (by default). This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. |