First published: Tue Nov 01 2016(Updated: )
It was found that redis set weak permissions on certain files that could potentially contain sensitive information: -rw-r--r--. 1 redis root 41599 Feb 8 2016 /etc/redis.conf -rw-r--r--. 1 redis root 7355 Feb 8 2016 /etc/redis-sentinel.conf drwxr-xr-x. 2 redis redis 4096 Sep 9 14:29 /var/lib/redis This issue was originally reported in <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED CURRENTRELEASE - Suspicious permissions for configs and data" href="show_bug.cgi?id=1374700">bug 1374700</a>.
Affected Software | Affected Version | How to fix |
---|---|---|
ioredis |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1390588 is considered moderate due to weak file permissions that could expose sensitive information.
To fix REDHAT-BUG-1390588, you should tighten the file permissions on /etc/redis.conf and /etc/redis-sentinel.conf to restrict access.
The affected files in REDHAT-BUG-1390588 include /etc/redis.conf and /etc/redis-sentinel.conf.
Users running Redis with default configurations are impacted by REDHAT-BUG-1390588 due to the weak file permissions.
If REDHAT-BUG-1390588 is not addressed, unauthorized users may gain access to sensitive configuration information.