|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2023-45145: redis: race condition during UNIX socket creation leads to permission bypass | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Carlos López <carlos.lopez> |
| Component: | Incidents | Assignee: | Security Team bot <security-team> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | Andreas.Stieger, danilo.spinella, stoyan.manolov |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | Other | ||
| URL: | https://smash.suse.de/issue/382300/ | ||
| Whiteboard: | CVSSv3.1:SUSE:CVE-2023-45145:7.0:(AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) | ||
| Found By: | --- | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Carlos López
2023-10-18 12:10:55 UTC
Affected: - SUSE:ALP:Source:Standard:1.0/redis - SUSE:SLE-15-SP4:Update/redis - SUSE:SLE-15-SP2:Update/redis (In reply to Carlos López from comment #2) > Affected: > - SUSE:ALP:Source:Standard:1.0/redis > - SUSE:SLE-15-SP4:Update/redis > - SUSE:SLE-15-SP2:Update/redis And Factory (In reply to Andreas Stieger from comment #4) > https://build.opensuse.org/request/show/1118644 Danilo please consider this. Two security fixes are blocked by python-redis. You should bump Tumbleweed from 7.0.12 to 7.0.14, and later progress the 7.2 work SUSE-SU-2023:4290-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1216376 CVE References: CVE-2023-45145 Sources used: openSUSE Leap 15.4 (src): redis-6.2.6-150400.3.25.1 openSUSE Leap 15.5 (src): redis-6.2.6-150400.3.25.1 Server Applications Module 15-SP4 (src): redis-6.2.6-150400.3.25.1 Server Applications Module 15-SP5 (src): redis-6.2.6-150400.3.25.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2023:4376-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1216376 CVE References: CVE-2023-45145 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Manager Proxy 4.2 (src): redis-6.0.14-150200.6.29.1 SUSE Manager Retail Branch Server 4.2 (src): redis-6.0.14-150200.6.29.1 SUSE Manager Server 4.2 (src): redis-6.0.14-150200.6.29.1 SUSE Enterprise Storage 7.1 (src): redis-6.0.14-150200.6.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. SUSE-SU-2024:0200-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (important) Bug References: 1212119, 1216376 CVE References: CVE-2023-45145 Sources used: openSUSE Leap 15.5 (src): redis7-7.0.8-150500.3.9.1 Server Applications Module 15-SP5 (src): redis7-7.0.8-150500.3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination. |