Количество 14
Количество 14
CVE-2023-45145
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
CVE-2023-45145
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
CVE-2023-45145
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
CVE-2023-45145
Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window.
CVE-2023-45145
Redis is an in-memory database that persists on disk. On startup, Redi ...
SUSE-SU-2024:0200-1
Security update for redis7
SUSE-SU-2023:4376-1
Security update for redis
SUSE-SU-2023:4290-1
Security update for redis
ROS-20231030-06
Уязвимость redis
BDU:2023-07323
Уязвимость сокета Unix системы управления базами данных Redis, связана с раскрытием информации в ошибочной области данных, позволяющая нарушителю раскрыть защищаемую информацию
RLSA-2025:0693
Important: redis security update
ELSA-2025-0693
ELSA-2025-0693: redis security update (IMPORTANT)
ELSA-2024-10869
ELSA-2024-10869: redis:7 security update (MODERATE)
ELSA-2025-0595
ELSA-2025-0595: redis:6 security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-45145 Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory. | CVSS3: 3.6 | 1% Низкий | около 2 лет назад | |
CVE-2023-45145 Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory. | CVSS3: 3.6 | 1% Низкий | около 2 лет назад | |
CVE-2023-45145 Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory. | CVSS3: 3.6 | 1% Низкий | около 2 лет назад | |
CVE-2023-45145 Redis Unix-domain socket may have be exposed with the wrong permissions for a short time window. | CVSS3: 3.6 | 1% Низкий | около 1 месяца назад | |
CVE-2023-45145 Redis is an in-memory database that persists on disk. On startup, Redi ... | CVSS3: 3.6 | 1% Низкий | около 2 лет назад | |
SUSE-SU-2024:0200-1 Security update for redis7 | 1% Низкий | почти 2 года назад | ||
SUSE-SU-2023:4376-1 Security update for redis | 1% Низкий | около 2 лет назад | ||
SUSE-SU-2023:4290-1 Security update for redis | 1% Низкий | около 2 лет назад | ||
ROS-20231030-06 Уязвимость redis | CVSS3: 3.6 | 1% Низкий | около 2 лет назад | |
BDU:2023-07323 Уязвимость сокета Unix системы управления базами данных Redis, связана с раскрытием информации в ошибочной области данных, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 3.6 | 1% Низкий | около 2 лет назад | |
RLSA-2025:0693 Important: redis security update | 8 месяцев назад | |||
ELSA-2025-0693 ELSA-2025-0693: redis security update (IMPORTANT) | 10 месяцев назад | |||
ELSA-2024-10869 ELSA-2024-10869: redis:7 security update (MODERATE) | 11 месяцев назад | |||
ELSA-2025-0595 ELSA-2025-0595: redis:6 security update (IMPORTANT) | 10 месяцев назад |
Уязвимостей на страницу