Source: redis
Version: 5:7.0.12-2
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for redis.

CVE-2023-41053[0]:
| Redis is an in-memory database that persists on disk. Redis does not
| correctly identify keys accessed by `SORT_RO` and as a result may
| grant users executing this command access to keys that are not
| explicitly authorized by the ACL configuration. The problem exists
| in Redis 7.0 or newer and has been fixed in Redis 7.0.13 and 7.2.1.
| Users are advised to upgrade. There are no known workarounds for
| this vulnerability.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2023-41053
    https://www.cve.org/CVERecord?id=CVE-2023-41053
[1] 
https://github.com/redis/redis/commit/0f14d3279212e1b262869b6160db87d6f117cff5
[2] https://github.com/redis/redis/security/advisories/GHSA-q4jr-5p56-4xwc

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to