Lucene search

K
freebsdFreeBSD8706E097-6DB7-11EE-8744-080027F5FEC9
HistoryOct 18, 2023 - 12:00 a.m.

redis -- Possible bypassing Unix socket permissions

2023-10-1800:00:00
vuxml.freebsd.org
9
redis
unix socket
permissions
race condition
bypass

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

Redis core team reports:

    The wrong order of listen(2) and chmod(2) calls creates a
    race condition that can be used by another process to
    bypass desired Unix socket permissions on startup.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchredis< 7.2.2UNKNOWN
FreeBSDanynoarchredis-devel< 7.2.2.20231018UNKNOWN
FreeBSDanynoarchredis70< 7.0.14UNKNOWN
FreeBSDanynoarchredis62< 6.2.14UNKNOWN

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N