Bugzilla – Bug 1216376
VUL-0: CVE-2023-45145: redis: race condition during UNIX socket creation leads to permission bypass
Last modified: 2024-05-30 14:36:37 UTC
CVE-2023-45145 The wrong order of listen(2) and chmod(2) calls creates a race condition that can be used by another process to bypass desired Unix socket permissions on startup. References: https://github.com/redis/redis/releases/tag/7.2.2
Fix: https://github.com/redis/redis/commit/1119ecae6fd8796fa337df2212f09173ab6c7b0a
Affected: - SUSE:ALP:Source:Standard:1.0/redis - SUSE:SLE-15-SP4:Update/redis - SUSE:SLE-15-SP2:Update/redis
(In reply to Carlos López from comment #2) > Affected: > - SUSE:ALP:Source:Standard:1.0/redis > - SUSE:SLE-15-SP4:Update/redis > - SUSE:SLE-15-SP2:Update/redis And Factory
https://build.opensuse.org/request/show/1118644
(In reply to Andreas Stieger from comment #4) > https://build.opensuse.org/request/show/1118644 Danilo please consider this. Two security fixes are blocked by python-redis. You should bump Tumbleweed from 7.0.12 to 7.0.14, and later progress the 7.2 work
SUSE-SU-2023:4290-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1216376 CVE References: CVE-2023-45145 Sources used: openSUSE Leap 15.4 (src): redis-6.2.6-150400.3.25.1 openSUSE Leap 15.5 (src): redis-6.2.6-150400.3.25.1 Server Applications Module 15-SP4 (src): redis-6.2.6-150400.3.25.1 Server Applications Module 15-SP5 (src): redis-6.2.6-150400.3.25.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:4376-1: An update that solves one vulnerability can now be installed. Category: security (important) Bug References: 1216376 CVE References: CVE-2023-45145 Sources used: SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): redis-6.0.14-150200.6.29.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): redis-6.0.14-150200.6.29.1 SUSE Manager Proxy 4.2 (src): redis-6.0.14-150200.6.29.1 SUSE Manager Retail Branch Server 4.2 (src): redis-6.0.14-150200.6.29.1 SUSE Manager Server 4.2 (src): redis-6.0.14-150200.6.29.1 SUSE Enterprise Storage 7.1 (src): redis-6.0.14-150200.6.29.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2024:0200-1: An update that solves one vulnerability and has one security fix can now be installed. Category: security (important) Bug References: 1212119, 1216376 CVE References: CVE-2023-45145 Sources used: openSUSE Leap 15.5 (src): redis7-7.0.8-150500.3.9.1 Server Applications Module 15-SP5 (src): redis7-7.0.8-150500.3.9.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.