Lucene search

K
mageiaGentoo FoundationMGASA-2023-0301
HistoryOct 24, 2023 - 8:25 p.m.

Updated redis package fixes a security vulnerability

2023-10-2420:25:46
Gentoo Foundation
advisories.mageia.org
13
redis
upstream
security vulnerability
unix socket
race condition
cve-2023-45145

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

10.6%

Redis upstream published a fix for CVE-2023-45145. CVE-2023-45145: The wrong order of listen(2) and chmod(2) calls creates a race condition that can be used by another process to bypass desired Unix socket permissions on startup.

OSVersionArchitecturePackageVersionFilename
Mageia9noarchredis< 7.0.14-1redis-7.0.14-1.mga9

3.6 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

10.6%