Bugzilla – Bug 1215094
VUL-0: CVE-2023-41053: redis: SORT_RO may bypass ACL configuration
Last modified: 2024-03-04 17:10:24 UTC
CVE-2023-41053 Redis is an in-memory database that persists on disk. Redis does not correctly identify keys accessed by `SORT_RO` and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. The problem exists in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1. Users are advised to upgrade. There are no known workarounds for this vulnerability. https://github.com/redis/redis/commit/9e505e6cd842338424e05883521ca1fb7d0f47f6 https://github.com/redis/redis/security/advisories/GHSA-q4jr-5p56-4xwc References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-41053 https://bugzilla.redhat.com/show_bug.cgi?id=2237826 https://www.cve.org/CVERecord?id=CVE-2023-41053 https://github.com/redis/redis/commit/9e505e6cd842338424e05883521ca1fb7d0f47f6 https://github.com/redis/redis/security/advisories/GHSA-q4jr-5p56-4xwc
Affected: - SUSE:ALP:Source:Standard:1.0 - openSUSE:Factory
SUSE-SU-2023:3711-1: An update that solves one vulnerability can now be installed. Category: security (low) Bug References: 1215094 CVE References: CVE-2023-41053 Sources used: openSUSE Leap 15.5 (src): redis7-7.0.8-150500.3.6.1 Server Applications Module 15-SP5 (src): redis7-7.0.8-150500.3.6.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.