drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in redis
Name: |
Mangelnde Rechteprüfung in redis |
|
ID: |
FEDORA-2023-0e9e7544df |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 37 |
|
Datum: |
Sa, 16. September 2023, 10:51 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41053 |
|
Applikationen: |
Redis |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2023-0e9e7544df 2023-09-16 01:40:12.903746 ------------------------------------------------------------------------------- -
Name : redis Product : Fedora 37 Version : 7.0.13 Release : 1.fc37 URL : https://redis.io Summary : A persistent key-value database Description : Redis is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets.
You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set.
In order to achieve its outstanding performance, Redis works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log.
Redis also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth.
Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Redis behave like a cache.
You can use Redis from most programming languages also.
------------------------------------------------------------------------------- - Update Information:
**Redis 7.0.13** Released Wed 06 Sep 2023 15:00:00 IDT Upgrade urgency SECURITY: See security fixes below. Security Fixes * (**CVE-2023-41053**) Redis does not correctly identify keys accessed by SORT_RO and as a result may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. Bug Fixes * Cluster: fix a race condition where a slot migration may revert on a subsequent failover or node joining (#12344) * Ensure that the function load timeout is disabled during loading from RDB/AOF and on replicas. (#12451) * Fix the assertion when script timeout occurs after it signaled a blocked client (#12459) ------------------------------------------------------------------------------- - ChangeLog:
* Thu Sep 7 2023 Remi Collet <remi@remirepo.net> - 7.0.13-1 - Upstream 7.0.13 release ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #2237826 - CVE-2023-41053 redis: Redis SORT_RO may bypass ACL configuration https://bugzilla.redhat.com/show_bug.cgi?id=2237826 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2023-0e9e7544df' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
|
|
|
|