Bug 2244940 (CVE-2023-45145) - CVE-2023-45145 redis: possible bypass of Unix socket permissions on startup
Summary: CVE-2023-45145 redis: possible bypass of Unix socket permissions on startup
Keywords:
Status: NEW
Alias: CVE-2023-45145
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2244941 2244942 2247172
Blocks: 2244939
TreeView+ depends on / blocked
 
Reported: 2023-10-18 22:31 UTC by Robb Gatica
Modified: 2024-03-27 19:10 UTC (History)
35 users (show)

Fixed In Version: redis 7.2.2, redis 7.0.14, redis 6.2.14
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Redis, an in-memory database that persists on disk. On startup, Redis listens on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Robb Gatica 2023-10-18 22:31:28 UTC
CVE-2023-45145 - The wrong order of listen(2) and chmod(2) calls creates a
race condition that can be used by another process to bypass desired Unix
socket permissions on startup.

Upstream have released version 7.0.14/7.2.2 to fix CVE-2023-45145.

Reference:
- https://github.com/redis/redis/releases/tag/7.0.14
- https://bugs.mageia.org/32406

Comment 1 Robb Gatica 2023-10-18 22:31:47 UTC
Created redis tracking bugs for this issue:

Affects: epel-all [bug 2244941]
Affects: fedora-all [bug 2244942]


Note You need to log in before you can comment on or make changes to this bug.